.611757] bridge0: port 2(bridge_slave_1) entered blocking state [ 1368.618103] bridge0: port 2(bridge_slave_1) entered disabled state [ 1368.625162] device bridge_slave_1 entered promiscuous mode [ 1368.644556] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1368.654444] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1368.704560] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1368.711987] team0: Port device team_slave_0 added [ 1368.732139] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1368.739180] team0: Port device team_slave_1 added [ 1368.746816] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1368.756331] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1368.763469] chnl_net:caif_netlink_parms(): no params data found [ 1368.842311] device hsr_slave_0 entered promiscuous mode [ 1368.890555] device hsr_slave_1 entered promiscuous mode [ 1368.956893] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1368.968014] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1368.983760] bridge0: port 1(bridge_slave_0) entered blocking state [ 1368.990541] bridge0: port 1(bridge_slave_0) entered disabled state [ 1368.997425] device bridge_slave_0 entered promiscuous mode [ 1369.004199] bridge0: port 2(bridge_slave_1) entered blocking state [ 1369.010677] bridge0: port 2(bridge_slave_1) entered disabled state [ 1369.017687] device bridge_slave_1 entered promiscuous mode [ 1369.038780] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1369.048351] bridge0: port 2(bridge_slave_1) entered blocking state [ 1369.054729] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1369.061451] bridge0: port 1(bridge_slave_0) entered blocking state [ 1369.067779] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1369.080519] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1369.101643] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1369.108710] team0: Port device team_slave_0 added [ 1369.115913] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1369.123011] team0: Port device team_slave_1 added [ 1369.128544] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1369.136937] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1369.202352] device hsr_slave_0 entered promiscuous mode [ 1369.260489] device hsr_slave_1 entered promiscuous mode [ 1369.305394] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1369.313027] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1369.328748] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1369.335134] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1369.345454] bridge0: port 2(bridge_slave_1) entered blocking state [ 1369.351810] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1369.358433] bridge0: port 1(bridge_slave_0) entered blocking state [ 1369.364793] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1369.377404] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1369.387675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1369.395040] bridge0: port 1(bridge_slave_0) entered disabled state [ 1369.401933] bridge0: port 2(bridge_slave_1) entered disabled state [ 1369.409101] bridge0: port 1(bridge_slave_0) entered disabled state [ 1369.416099] bridge0: port 2(bridge_slave_1) entered disabled state [ 1369.426919] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1369.433496] 8021q: adding VLAN 0 to HW filter on device team0 [ 1369.445514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1369.453412] bridge0: port 1(bridge_slave_0) entered blocking state [ 1369.459745] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1369.466675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1369.474605] bridge0: port 2(bridge_slave_1) entered blocking state [ 1369.481132] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1369.499528] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1369.509607] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1369.520345] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1369.527989] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1369.535762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1369.543542] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1369.551701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1369.559065] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1369.566842] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1369.573790] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1369.586648] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1369.600747] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1369.624034] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1369.633354] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1369.642863] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1369.649036] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1369.656510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1369.666399] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1369.670122] net_ratelimit: 18 callbacks suppressed [ 1369.670127] protocol 88fb is buggy, dev hsr_slave_0 [ 1369.672742] 8021q: adding VLAN 0 to HW filter on device team0 [ 1369.677560] protocol 88fb is buggy, dev hsr_slave_1 [ 1369.685778] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1369.688754] protocol 88fb is buggy, dev hsr_slave_0 [ 1369.694274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1369.701062] protocol 88fb is buggy, dev hsr_slave_1 [ 1369.706978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1369.726666] bridge0: port 1(bridge_slave_0) entered blocking state [ 1369.733186] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1369.742940] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1369.756887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1369.765579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1369.773510] bridge0: port 2(bridge_slave_1) entered blocking state [ 1369.780090] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1369.789353] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1369.796278] protocol 88fb is buggy, dev hsr_slave_0 [ 1369.796319] protocol 88fb is buggy, dev hsr_slave_1 [ 1369.820533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1369.829426] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1369.838170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1369.848310] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1369.858092] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1369.866692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1369.874482] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1369.882575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1369.890361] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1369.900252] protocol 88fb is buggy, dev hsr_slave_0 [ 1369.905359] protocol 88fb is buggy, dev hsr_slave_1 [ 1369.916477] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1369.927324] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1369.935762] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1369.943117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1369.950924] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1369.958275] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1369.966925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1369.977295] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1369.988143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1370.003837] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1370.020379] protocol 88fb is buggy, dev hsr_slave_0 [ 1370.025841] protocol 88fb is buggy, dev hsr_slave_1 [ 1370.036849] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1371.222642] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:04 executing program 5: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x9) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x20000, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x36, &(0x7f0000000100), &(0x7f0000000180)=0x4) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:04 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xdda1594c73fca0d) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)=""/24, 0x19a) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x2, 0x101081) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000100)={r0}) dup3(r0, r1, 0x0) 08:42:04 executing program 2: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:04 executing program 3: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000100)={0xa00000000000, 0x7, 0x9ff, 0x1}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:04 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:04 executing program 2: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80, 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in=@dev={0xac, 0x14, 0x14, 0x13}, @in=@remote, 0x4e23, 0x2, 0x4e23, 0xf, 0x2, 0xa0, 0x20, 0xbb, 0x0, r3}, {0x1dde, 0xffffffff, 0x9, 0x17, 0x5, 0x8, 0x5, 0x9}, {0x3, 0x6, 0x3, 0x3}, 0x3, 0x6e6bb5, 0x3, 0x1, 0x0, 0x3}, {{@in6=@loopback, 0x4d6, 0x33}, 0xa, @in6=@rand_addr="52429f962624b0b33c8643105c474439", 0x34ff, 0x1, 0x0, 0x1ff, 0x80000001, 0x3f3, 0x10001}}, 0xe8) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$tipc(0x1e, 0x7, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) read(r1, &(0x7f0000000180)=""/241, 0xf1) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x3}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e21, 0xab, @empty, 0x7}}}, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r4, 0x20, 0x70bd2c, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x4000800) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1371.592856] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1371.622615] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:04 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x103, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 08:42:04 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1371.744337] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x105000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(r2, &(0x7f0000000280)=""/225, 0xe1, 0x140, &(0x7f0000000640)={0x11, 0x16, r3, 0x1, 0xab, 0x6, @remote}, 0x14) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r4 = dup3(r0, r1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0xef, &(0x7f0000000180)=""/247, &(0x7f0000000080)=0xf7) 08:42:05 executing program 5: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @remote}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:05 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000100)={0x2ec, 0x5, 0x8, 0x3}, 0x8) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:05 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:05 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x103, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 08:42:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x801, 0x0) sendmsg$rds(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)=""/238, 0xee}], 0x1, 0x0, 0x0, 0x1}, 0x40000) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f0000000300)="d6055421399e70e83bd9d1786ac708cea5f3cfb70a723dab477d9221dfa56b726651bfddb28c36f1ef5a5329f9cceb2dee08ae5b747e2761109acb3ad694303f7eba8cb54f98a96c05034c675ea28821", 0x50, 0x4000800, &(0x7f0000000380)={0xa, 0x4e22, 0x4, @empty, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x800, 0x7, 0x5, 0x28, 0x20}) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r3 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2a, 0x420080) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x44400}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r4, 0x104, 0x70bd2d, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x48040}, 0x8000) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000100)={0xaa, 0x3a}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:05 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:05 executing program 1: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f00000003c0)={0x6, 0x2, 'client0\x00', 0x4, "b0329f7aedb0117b", "d182af8ec3d29a826d2a9cda7064261824d254f03a4d20965477d64671967007", 0x2, 0x80}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @remote}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x478a0172b6ed2992}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r3, 0x4c, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @rand_addr=0x401}, @in6={0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x40}}}, 0x118) prctl$PR_MCE_KILL(0x21, 0x0, 0x1) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000080)) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000004c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000480), r3, r4}}, 0x18) setsockopt$ax25_int(r4, 0x101, 0x2, &(0x7f0000000340)=0x1000, 0x4) dup3(r1, r2, 0x0) [ 1372.383459] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:05 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000100)={0x2ec, 0x5, 0x8, 0x3}, 0x8) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f0000000180)="ef58cb5726c8c10c8242d3bffaaba748fe3076d25bce2ee5f7deadcef0ce2daf45f689699fb06eca47feda98597fd4e8b5b0df29da21b54537ebec03f7a3f5330aa21462c42e2096e5b82d50ecb9247fc986a6f8f03786f84c0521c20bb4e18ec8083b32708e81fa4ef2ca2b55e97e80998994250cc293bc9c9324abb183f74799a635753fc87a5b25ca3a3c14141395200500b45b57512677011b4b3ba5e93fc760f02ac00a15605829c0244ad39690e6663c5bcb20b2b0c9de206450a44ddb9a92cf0e777a731a63a11ec7abb38b8d4d1de88f116bc89e72", 0xd9) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1372.498673] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1372.594120] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x6, 0x4000) ioctl$KDSETMODE(r1, 0x4b3a, 0x7fffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r2, 0x0) 08:42:06 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:06 executing program 5: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:06 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000100)={0x2ec, 0x5, 0x8, 0x3}, 0x8) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x80100, 0x0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000100)={0xffffffff80000000, 0x9}) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8) dup3(r0, r1, 0x0) 08:42:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f0000000180)="ef58cb5726c8c10c8242d3bffaaba748fe3076d25bce2ee5f7deadcef0ce2daf45f689699fb06eca47feda98597fd4e8b5b0df29da21b54537ebec03f7a3f5330aa21462c42e2096e5b82d50ecb9247fc986a6f8f03786f84c0521c20bb4e18ec8083b32708e81fa4ef2ca2b55e97e80998994250cc293bc9c9324abb183f74799a635753fc87a5b25ca3a3c14141395200500b45b57512677011b4b3ba5e93fc760f02ac00a15605829c0244ad39690e6663c5bcb20b2b0c9de206450a44ddb9a92cf0e777a731a63a11ec7abb38b8d4d1de88f116bc89e72", 0xd9) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1373.214171] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1373.217506] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x105000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(r2, &(0x7f0000000280)=""/225, 0xe1, 0x140, &(0x7f0000000640)={0x11, 0x16, r3, 0x1, 0xab, 0x6, @remote}, 0x14) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r4 = dup3(r0, r1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0xef, &(0x7f0000000180)=""/247, &(0x7f0000000080)=0xf7) 08:42:06 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1373.308120] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) tee(r1, r1, 0x8000, 0x8) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x501080, 0x0) sendmmsg$alg(r2, &(0x7f00000033c0)=[{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)="a5dd68d294620ee8a8860fd6a60dbd5f0eb4571bddcb7240384e4ef40dc01ef3405c08625df7046bd59dc1df700a8ed0deb6e845f52c9f2c04b7d273450535dba3aa7bd6a678abccf1877f41092ec0c4cbefc12f2705a6cfda6b939da0beb6e53f1f0ea82400a77f1008a3bcd2e30fb467db26ce52e7c0e86d43f031007f9cc9ad119d2bf1d88e3888dde57f75f71edd9ab5b604e119e2527952fce76f2f5d7cdcd7ab752a43c186f7a875c506573a03649ff5f023aadda79790b71c37543b92b08e074ea54ba343e99f5a940df5778ec1e35ce352959b36c76fc758dcdc52f43f86b8d838b1dc2ab814658cfefa113e", 0xf0}, {&(0x7f0000000280)="db71067d95fb886833d9164edf69008dede3d030b5cf24505455327b0ea609c69c12d3ca77d4b0eec8796b422a505a94093a8e59e97c3a8c7d624930ef176658437037e1e825af8c19aac7315692ea392b18b5264bd44cb602e91860040a89a25a84746879f9a1cc75ca73ce70329636c009c05e26a3c221437dca98d89b8556f99427f74b74441245d035a83dd4fec1dffba3d4790cec0c76d8f86fd34fa55da34db3e3421917a5edbaa868ac5f9404a9ce0d6fccd1faeb867c953c201099743f99d6f4457d3f411cfa7b97027ebfc5bf2a60bef2ba2db1bc1decaf92e3d706096af087482c2967ba8438b582a3223c86a377df6fcd58552e9438a872a7f0", 0xff}, {&(0x7f0000000380)="9c02807794aff85c0d728bb140d3a1f939b2302189d6851c6927baa7077339163909be95d64fb8fb6045d0a7b7c1d9ca1efe5fcec966b3f69a56d9a7db71af91ed7028de72c97ffc692e0dc53ed7bcdc219aebeb7b6ccfa80a0f525a361d3b3e55d0df1034230d194d0805e1725b36bc935c10ff0977738388d2dd248ab1148b7c019774f1b72e049bbdd834a3e8b4f19892cce8352482505e0587f3bc43b70c9bcfd931de60527c0dd4137ecb7c031bf97fd5ca9858af1c7a6c339b21c32caf74dc493764978c44327a7c3f1e41983f4155054d21fb13000a2ffedea58e17a7ea482c35ab5eb13cb9b55ca38102f7e2f9280f2611a8dcb2a3", 0xf9}], 0x3, &(0x7f0000000480)=[@op={0x18}], 0x18, 0x5}, {0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000004c0)="52657bd9bb22f928ed5ab5509710d72ba630f64bd7e04ac1d8a50dd958fbd848af561884b97cf35eef6a5dae73ee07b4049a136e6655c6ce9621438f498e96605fb4a9606e18293d44ff", 0x4a}, {&(0x7f0000000540)="a8547dc51949c35ab7957453ae", 0xd}, {&(0x7f0000000580)="e97852e724010b6f0ba00460897840945caf0fa70f6e0a870a31c0eed2f0dec6b22337b993eba3e5657dd2006f1a77358bd43e8de758ebd280b87c754fcf4a81b598712ce75c6d33e6a325e7e04a6adc11df9c2025007883727977970e2322eaea9fc9d2e1cdec0e9a7f0c58a81456dc0a15019618d5c0368cca4a6067cb49a94703fda08589bb7c645519412137aaab8d0502012450aac53b4127ccff63841a5076e43c04f52c0f539a53ad4fbc5a9a12c51ebe91ff52ce01a0386a0a5531e7998e97f0665a570ac99a787295c3fa88ebdfaf4eb8c1080c02a91cc6aaef9563f69229f08a3e8a4ed5221f24c4b67b38bc3687b0f5ad46", 0xf7}, {&(0x7f0000000680)="bdec3c5bd5ec99599450671282768ad81e4ad9cbb00db19180c5213a3a142da076531985d985650367d081d98c08e7d9fa27a1c88b359f5affa96825d9140d44f09b7f6b83a64250121649c37985be6c33e945f8d959d30fcf8f6726b23e13f6d848f5fa9873e2f352f857e293d5947282ee0b92abf5c70f297ae66c49eea50e71c387acb014b53fb9e94a0a6e530375", 0x90}, {&(0x7f0000000740)="b8294e303ac0415791248a55963479939d447fbf0bd07e053f492a9b06da7f7c1bddf14eec98a769b46908598affeb3a94efd41652e45f57d040a7d34fc2347d0a5f61e6783425080e45a036fe45d724d17db0e58e60b2459aba301c29bbc4a35d92acb32eed500f2bc454a797ec5fe922a930bd0688ec2bcf69695c187d18a28cf2e6c3c400c447b2ea63c04cb0c458b223abe5fa40d7dea6f4b7078c90e1b0c8f8c88c190801e4f040e1cfb5701c6a31121acc00b9b453c994f13d4b88ef63f9792bfbbf162c600d1d301b32bfe2302aefc3d226f7f3907395bdde175762c1358e", 0xe2}], 0x5, &(0x7f00000008c0)=[@assoc={0x18, 0x117, 0x4, 0x3}], 0x18, 0x20040000}, {0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000900)="ffc8bd668951af6c770fe1ddffe13be9f4cca14236ddef0c7f", 0x19}, {&(0x7f0000000940)="2d39dee7a267a79dc5c40a2e7b7e15c3fd7a565e5b2cf67e7dc3bca3129de9a29f06c89117be797555c2048866e3a8009170faea17e8fd351807cc711daf", 0x3e}, {&(0x7f0000000980)="b3a664e318b9aec38aa9f55040670ece7c0ab6e7908502f060f67243f5ba272877e323976bf2453b3a18effb443c1c43bcbcf5dbc51aeb7d9d6a0a9582886dd3748c755ab4671f9ebdb3fd39bf4588523b0e8b9548f998e6b2f66124523bd0462bee5ab60a93406f3e1504efda34d3e56ace5053b0af62992c8381fb38c44b39e612858f107d3fe383a8083a7c98ade038a15552ec182ecb87c35e556a71e79abaf4f88ac21c3bf36a5078017c031d6a1ff8b819a830e23f9d5ff35c138f4d61a6248cfc0a16", 0xc6}, {&(0x7f0000000a80)="9b5b40692f4717860deeb631cfce5003d80107c4730f5b715c49b05483d81253582e2601a87b4e95ced7ba92a4e6be436713fa296b54b0a62639a4013307a36b0a41718c92e12915e3e12525704ad34de04029c9d305534e3c16876595c54c1bfcfc4cc372d60519c6cfbb3fd4a6af4494a3eee67fd00c17d20ed93a1deb2b2571b9ccc90092cc345a04a980bd75643ff3b24310e3160503209deb478e935316ce201ce9f69863f3df1d48061abe05c3e6acf04fc3577c1527d5d93f", 0xbc}, {&(0x7f0000000b40)="02899bff13da513d1faad78554582f294643f5b9ffd54bd08b1e9b962acabe22838f4fee361a39e062470d008ca60c7bd53906e81de6352f84ecf872cdfcf97731dbab7b4c7788c68da1e4a2286b2382ecd7ce1b22995a36db5834e5aac242630de2ef586a85a89e50944ee412bae442b05aad8f7bdf92d3acaecd9f77f92e386eafdf22dc076a36ec8f1a06454369e593778a2bc0cabf1b07fd8648cdc2360fde7c5bbe3e8dd17fa9ac97427de4138808bf0f9a356511ddcdaade8d34b42a68b4cdfa8696e710410602ea", 0xcb}], 0x5, &(0x7f0000000cc0)=[@op={0x18}, @iv={0x110, 0x117, 0x2, 0xf6, "c9c74573993e1d622f80000e3443f2ab1fb29310ba082d704a7ff449881215d7111e10461676883a4c55f91db2e2f12c6b0714380b029bf32b5a1d360c1e1e8780adc6c994048ced73f7eddd447db4fe872886df17b3e48fc2b07119e4b3a229076165cfbdfd1894cc154b90d929e11df0cc9ffdd53fa9222f9526fab3d6e34097b06fd81231f41f674ea62af5124bb3d07992d830ab20fed98eca266c3759c951206392481f11004dae4f93295b2a93984ab2cb64c776d05a39cc97610cf2b12968105a798c241daaff2680eeb8f35b07e24529f5b4b7189b1339e7df841f314ee942dcf25decc656f667e136e51042b1b4a6aba565"}, @assoc={0x18, 0x117, 0x4, 0x5}], 0x140, 0x4004}, {0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000e00)="a6eb2bde13a1fd39091cfbd8f2dd2954be638eac02cde04e5e0dc6b07200cf26416dc335979af045d5d588ae1638d616d1b65de0fb998dc0a1c970fd771fe647", 0x40}, {&(0x7f0000000e40)="df57808fefd9e81f1a4de120ce3d854962d736e08f888d97158d2ba77c02fb722316c73f39019d98c16a5444ec05043253d2d9323dca78a4746de2c6d3ae7f85a1fb98af96b3e9bd92d4cf19af98854d4f9195ea20af1220fea105b173c6d6ebbcfb115a765a6e74023283aaa049abb70dc883899a117911c8c8ce9ec4d69573cad16aa742dd59693aeff6b23f1bb490402cecfe4f09da8db53ebe9e5ddb5e7a5afe211cd637eea5daec39d72bd76fa6aa98a7c18ec660ef", 0xb8}], 0x2, &(0x7f0000000f40)=ANY=[@ANYBLOB="18000000000000001701000004000000fcffffff00000000180000000000000017010000030000000000000000000000180000000000000017010000040000000300000000000000980000000000000017010000020000008100000046eb2f90c3a6198865c9e7baf4fadaaf9d8b26c4bce14a3b0c9d9b97301bad6769bf52d6be9f59ffdf0b3b998be4e2b4a3056a8749b067884738b0813e7e21d13ebbadeed24f181e58d0b1e660c17b5fec9fb4c962e56a248233ac4aa89de5afa97346f2185f50514fd9aeb6d1b16abb754050884cef8c142ff7e3ac88a5edc96e000000"], 0xe0, 0x1}, {0x0, 0x0, &(0x7f0000002040)=[{&(0x7f0000001040)="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", 0x1000}], 0x1, &(0x7f0000002080)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x7fffffff}, @assoc={0x18, 0x117, 0x4, 0x800000}, @assoc={0x18, 0x117, 0x4, 0x1f}], 0x60}, {0x0, 0x0, &(0x7f0000003340)=[{&(0x7f0000002100)="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", 0x1000}, {&(0x7f0000003100)="a77c4ddde9491b9ee49b5cd5e1d8d5d18cb9b64958976e9ed0a54167fd2fe08b9054e147c3c1e08cf1baad5f40c988d3ef1ca6da28450bea3a00b009abb93fe19b38d7b4b9e7d7e94171ad091e1488db454544b11d3ee8849e902a69026889ac4041c47df36ebebbe52ab2ab691b1c8728e6c43f28fc70e0869bba38b1", 0x7d}, {&(0x7f0000003180)="876d7edb5425178157cc68e94458394a98ea21695ddc7561284ccc430ee74d4122c1e25e4a4c95609a28497663d41af32bb3439acb63f995ea7fc586648c38644545287a8e2383d79ed51481718fd92f887bfcd956a2093b8a9a6757c60869d261ff23bba0471187f733fe0d46e06f3a89673d968906c426cf61b4dcdc85e315ddc14c3c052829c834cdef2a9e9361e2f2fcd71d632cccaa1127c2b0f0963f0d59f88548a5d0cb864abef742353fedaeab3b700b18def3364dad60850039ddfbbc689103386f2cff523a9c534e9bf4", 0xcf}, {&(0x7f0000003280)="9136c740057a970036a5e6d75c2fd420dc43bffd73f889ffcada904382312bfdf14fcff92aa2b1064be1b19294272d7a7c258850364b2b75b48e7ae94404e330c22c164b882e146b1c95e447f09348e43859210af173f574515f071daf67b72ba99f623ad4c18ee3334fb92ae6c7050ccd40673fb9af52f56c686816001a2a4f0fe82f0c9205a692b79178", 0x8b}], 0x4, &(0x7f0000003380), 0x0, 0x480c0}], 0x6, 0x20000094) sendto$inet6(r0, &(0x7f0000003380), 0xfffffffffffffdd0, 0x0, 0x0, 0x1201000000003618) write$FUSE_INTERRUPT(r2, &(0x7f0000003540)={0x10, 0x0, 0x4}, 0x10) dup3(r0, r1, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000003380)={0x80, 0x10, [0x7fffffff, 0x4, 0x7, 0xffffffff80000001]}) 08:42:06 executing program 2: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:06 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1373.473717] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1373.509579] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:06 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1373.580902] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000200)=@gcm_128={{0x304}, "0a9cdae8120a8c7d", "cee78a1235e2fba896daa8c3c870c216", "49861c95", "db1fb36f3a2c276b"}, 0xfffffdc3) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:07 executing program 5: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) ioctl$SIOCAX25GETUID(r2, 0x89e0, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, r3}) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f00000002c0)=[@in6={0xa, 0x4e23, 0x2, @remote, 0x5}, @in={0x2, 0x4e23, @rand_addr=0x8001}], 0x2c) socket$vsock_stream(0x28, 0x1, 0x0) 08:42:07 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) write$capi20(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = syz_open_dev$dmmidi(&(0x7f00000013c0)='/dev/dmmidi#\x00', 0x4, 0x400) write$P9_RWRITE(r2, &(0x7f0000001400)={0xb, 0x77, 0x2, 0x1}, 0xb) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="58286e430e756370ef53adf8a42314c8fdef4ef272fac14a71b13e6d8bd778782b76f13083fb84592ea70c500897f765f6d5fe9e3572bd90aea9ed1968368ee61cb8f8fdd9d46862b79172751e6bca94be4dad3a8fec250e0896b6271532f53dbeac502933e31270e2e55bcefb235d01d209a398e44e3678ebb35351427c07c1bc41e7cf299944fcbb7d9edb7f003d5451043fed6cde991c25a7bd9d0228c96d4bef4f59a31f68e0973e87de40b047450ffd0c8205f28305021f1da15d2468d2be82547f83bd41c3993c", 0x11d}, {&(0x7f0000001440)="6c1dc0197daed896b68c4214c9827c7497cc852ed7ddeb429746e36fde6a1cb0036847b1cba002ca806c0f9cbc18bad51ec1b46dae6a838adb6ea6f28723368108cfc2460328e2e8c679334c264560353fbcb56e21f718cb7b7409eee9ef48a340d1c78f87bc2d26d647fb0e7ee72adab35e06f1274b8d80b007f846d10448b8068768e7f3cfa63c5844c87bae5ec5b89086522e860415f6ac26a3c1bce42b86d5d43ac72b9b", 0xa6}], 0x34) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = fcntl$dupfd(r1, 0x406, r1) ioctl$sock_rose_SIOCDELRT(r3, 0x890c, &(0x7f0000001340)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0xff, @bcast, @rose={'rose', 0x0}, 0x1, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x1, 0x420, 0x93b, 0x400, 0x1f}, 0x14) 08:42:07 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1374.112028] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1374.143197] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x6, 0x4000) ioctl$KDSETMODE(r1, 0x4b3a, 0x7fffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r2, 0x0) 08:42:07 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:07 executing program 2: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1374.315755] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:07 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:07 executing program 5: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) tee(r1, r1, 0x8000, 0x8) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x501080, 0x0) sendmmsg$alg(r2, &(0x7f00000033c0)=[{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)="a5dd68d294620ee8a8860fd6a60dbd5f0eb4571bddcb7240384e4ef40dc01ef3405c08625df7046bd59dc1df700a8ed0deb6e845f52c9f2c04b7d273450535dba3aa7bd6a678abccf1877f41092ec0c4cbefc12f2705a6cfda6b939da0beb6e53f1f0ea82400a77f1008a3bcd2e30fb467db26ce52e7c0e86d43f031007f9cc9ad119d2bf1d88e3888dde57f75f71edd9ab5b604e119e2527952fce76f2f5d7cdcd7ab752a43c186f7a875c506573a03649ff5f023aadda79790b71c37543b92b08e074ea54ba343e99f5a940df5778ec1e35ce352959b36c76fc758dcdc52f43f86b8d838b1dc2ab814658cfefa113e", 0xf0}, {&(0x7f0000000280)="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", 0xff}, {&(0x7f0000000380)="9c02807794aff85c0d728bb140d3a1f939b2302189d6851c6927baa7077339163909be95d64fb8fb6045d0a7b7c1d9ca1efe5fcec966b3f69a56d9a7db71af91ed7028de72c97ffc692e0dc53ed7bcdc219aebeb7b6ccfa80a0f525a361d3b3e55d0df1034230d194d0805e1725b36bc935c10ff0977738388d2dd248ab1148b7c019774f1b72e049bbdd834a3e8b4f19892cce8352482505e0587f3bc43b70c9bcfd931de60527c0dd4137ecb7c031bf97fd5ca9858af1c7a6c339b21c32caf74dc493764978c44327a7c3f1e41983f4155054d21fb13000a2ffedea58e17a7ea482c35ab5eb13cb9b55ca38102f7e2f9280f2611a8dcb2a3", 0xf9}], 0x3, &(0x7f0000000480)=[@op={0x18}], 0x18, 0x5}, {0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000004c0)="52657bd9bb22f928ed5ab5509710d72ba630f64bd7e04ac1d8a50dd958fbd848af561884b97cf35eef6a5dae73ee07b4049a136e6655c6ce9621438f498e96605fb4a9606e18293d44ff", 0x4a}, {&(0x7f0000000540)="a8547dc51949c35ab7957453ae", 0xd}, {&(0x7f0000000580)="e97852e724010b6f0ba00460897840945caf0fa70f6e0a870a31c0eed2f0dec6b22337b993eba3e5657dd2006f1a77358bd43e8de758ebd280b87c754fcf4a81b598712ce75c6d33e6a325e7e04a6adc11df9c2025007883727977970e2322eaea9fc9d2e1cdec0e9a7f0c58a81456dc0a15019618d5c0368cca4a6067cb49a94703fda08589bb7c645519412137aaab8d0502012450aac53b4127ccff63841a5076e43c04f52c0f539a53ad4fbc5a9a12c51ebe91ff52ce01a0386a0a5531e7998e97f0665a570ac99a787295c3fa88ebdfaf4eb8c1080c02a91cc6aaef9563f69229f08a3e8a4ed5221f24c4b67b38bc3687b0f5ad46", 0xf7}, {&(0x7f0000000680)="bdec3c5bd5ec99599450671282768ad81e4ad9cbb00db19180c5213a3a142da076531985d985650367d081d98c08e7d9fa27a1c88b359f5affa96825d9140d44f09b7f6b83a64250121649c37985be6c33e945f8d959d30fcf8f6726b23e13f6d848f5fa9873e2f352f857e293d5947282ee0b92abf5c70f297ae66c49eea50e71c387acb014b53fb9e94a0a6e530375", 0x90}, {&(0x7f0000000740)="b8294e303ac0415791248a55963479939d447fbf0bd07e053f492a9b06da7f7c1bddf14eec98a769b46908598affeb3a94efd41652e45f57d040a7d34fc2347d0a5f61e6783425080e45a036fe45d724d17db0e58e60b2459aba301c29bbc4a35d92acb32eed500f2bc454a797ec5fe922a930bd0688ec2bcf69695c187d18a28cf2e6c3c400c447b2ea63c04cb0c458b223abe5fa40d7dea6f4b7078c90e1b0c8f8c88c190801e4f040e1cfb5701c6a31121acc00b9b453c994f13d4b88ef63f9792bfbbf162c600d1d301b32bfe2302aefc3d226f7f3907395bdde175762c1358e", 0xe2}], 0x5, &(0x7f00000008c0)=[@assoc={0x18, 0x117, 0x4, 0x3}], 0x18, 0x20040000}, {0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000900)="ffc8bd668951af6c770fe1ddffe13be9f4cca14236ddef0c7f", 0x19}, {&(0x7f0000000940)="2d39dee7a267a79dc5c40a2e7b7e15c3fd7a565e5b2cf67e7dc3bca3129de9a29f06c89117be797555c2048866e3a8009170faea17e8fd351807cc711daf", 0x3e}, {&(0x7f0000000980)="b3a664e318b9aec38aa9f55040670ece7c0ab6e7908502f060f67243f5ba272877e323976bf2453b3a18effb443c1c43bcbcf5dbc51aeb7d9d6a0a9582886dd3748c755ab4671f9ebdb3fd39bf4588523b0e8b9548f998e6b2f66124523bd0462bee5ab60a93406f3e1504efda34d3e56ace5053b0af62992c8381fb38c44b39e612858f107d3fe383a8083a7c98ade038a15552ec182ecb87c35e556a71e79abaf4f88ac21c3bf36a5078017c031d6a1ff8b819a830e23f9d5ff35c138f4d61a6248cfc0a16", 0xc6}, {&(0x7f0000000a80)="9b5b40692f4717860deeb631cfce5003d80107c4730f5b715c49b05483d81253582e2601a87b4e95ced7ba92a4e6be436713fa296b54b0a62639a4013307a36b0a41718c92e12915e3e12525704ad34de04029c9d305534e3c16876595c54c1bfcfc4cc372d60519c6cfbb3fd4a6af4494a3eee67fd00c17d20ed93a1deb2b2571b9ccc90092cc345a04a980bd75643ff3b24310e3160503209deb478e935316ce201ce9f69863f3df1d48061abe05c3e6acf04fc3577c1527d5d93f", 0xbc}, {&(0x7f0000000b40)="02899bff13da513d1faad78554582f294643f5b9ffd54bd08b1e9b962acabe22838f4fee361a39e062470d008ca60c7bd53906e81de6352f84ecf872cdfcf97731dbab7b4c7788c68da1e4a2286b2382ecd7ce1b22995a36db5834e5aac242630de2ef586a85a89e50944ee412bae442b05aad8f7bdf92d3acaecd9f77f92e386eafdf22dc076a36ec8f1a06454369e593778a2bc0cabf1b07fd8648cdc2360fde7c5bbe3e8dd17fa9ac97427de4138808bf0f9a356511ddcdaade8d34b42a68b4cdfa8696e710410602ea", 0xcb}], 0x5, &(0x7f0000000cc0)=[@op={0x18}, @iv={0x110, 0x117, 0x2, 0xf6, "c9c74573993e1d622f80000e3443f2ab1fb29310ba082d704a7ff449881215d7111e10461676883a4c55f91db2e2f12c6b0714380b029bf32b5a1d360c1e1e8780adc6c994048ced73f7eddd447db4fe872886df17b3e48fc2b07119e4b3a229076165cfbdfd1894cc154b90d929e11df0cc9ffdd53fa9222f9526fab3d6e34097b06fd81231f41f674ea62af5124bb3d07992d830ab20fed98eca266c3759c951206392481f11004dae4f93295b2a93984ab2cb64c776d05a39cc97610cf2b12968105a798c241daaff2680eeb8f35b07e24529f5b4b7189b1339e7df841f314ee942dcf25decc656f667e136e51042b1b4a6aba565"}, @assoc={0x18, 0x117, 0x4, 0x5}], 0x140, 0x4004}, {0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000e00)="a6eb2bde13a1fd39091cfbd8f2dd2954be638eac02cde04e5e0dc6b07200cf26416dc335979af045d5d588ae1638d616d1b65de0fb998dc0a1c970fd771fe647", 0x40}, {&(0x7f0000000e40)="df57808fefd9e81f1a4de120ce3d854962d736e08f888d97158d2ba77c02fb722316c73f39019d98c16a5444ec05043253d2d9323dca78a4746de2c6d3ae7f85a1fb98af96b3e9bd92d4cf19af98854d4f9195ea20af1220fea105b173c6d6ebbcfb115a765a6e74023283aaa049abb70dc883899a117911c8c8ce9ec4d69573cad16aa742dd59693aeff6b23f1bb490402cecfe4f09da8db53ebe9e5ddb5e7a5afe211cd637eea5daec39d72bd76fa6aa98a7c18ec660ef", 0xb8}], 0x2, &(0x7f0000000f40)=ANY=[@ANYBLOB="18000000000000001701000004000000fcffffff00000000180000000000000017010000030000000000000000000000180000000000000017010000040000000300000000000000980000000000000017010000020000008100000046eb2f90c3a6198865c9e7baf4fadaaf9d8b26c4bce14a3b0c9d9b97301bad6769bf52d6be9f59ffdf0b3b998be4e2b4a3056a8749b067884738b0813e7e21d13ebbadeed24f181e58d0b1e660c17b5fec9fb4c962e56a248233ac4aa89de5afa97346f2185f50514fd9aeb6d1b16abb754050884cef8c142ff7e3ac88a5edc96e000000"], 0xe0, 0x1}, {0x0, 0x0, &(0x7f0000002040)=[{&(0x7f0000001040)="3a6a6b589e641e3b85f9443c6ed968d4ad994885801c655756999c2d15f50e188475d6670140a7b9de78cd58595db27b2e6add67c6a4dd6df8c509f0cc1e7e261ef01aa9c808e3343a1cdee757e2109abdaa064816ee4a7ed9370825258d54300140c63d7f82f63cd7bc55f92cd01db859f9398750c41df01538a32deb432aa29bcc946d7dfdd2a663962ebb4495d17cc0d1c9001df08e67b52739fea4c0ce5b3eeb84da0d0e0b532f15493e9fd63f0f22bcef4037894825d620ddf519772eac39244837a6bec8bd6a99c090cf88213b53a8a3c3891539c27b4cb7974334c93248e41f4b78c4271d6da9dd8c08a52627d787c4eea8c73b71d2204c22daaf2ddda0f45bcb6fedd207268101604e207fb6d455b84d796da1a384e8d17a1dfe61f56cc327732dfc1f60ca7aaf646d4ff7abb145e02aabee46abec314aa68a97272a20a3d7c02e99525df39ac0a19f63d168e3b0c5e9c378a169818aae73d2779122babc4c0cfa8ab5206a96331a7f9ce7c2a5037249e720cba2f4e485d882c6e296ca22c10825159bb363df0a0ed52d21830cd6bc8a1fbc198736a4c21bb9939fac097610889f7bcbede210265a1b7bf8bc0118d8beb138e57afadaaef1ff2e9ca0fff7414f96b0ce26903774bf13c961d2d89646cc7d2805b4ecfe5d67a958eeeb220d9d9d9e39b2c5e93f0898e17f4066cee0143af8df2de67044677ce6088531627112a9d15c6b41db5a69fc8963f7668d2132daec412c8eb4155350786d794f67bab579c8d85941574e4bb6e5428195a2b66bc459dda692a7bc920eb4bf9ed05968179195676386fc747d39329ec71e0ecc2b7daef807f407d35af1476d180cd34f09634ee2b42662c5c61c4d3a4b3fbc0241cc285fe20cb906c449108db46b387b6b748a8fd9a91ac13ddf3635421000a78988ac038294786cd0d62d54543f742680849303f054a4158c19fdc92d5c5710bf2777e9faa525eb354be76fabf9fcc8555741a875bd374fd4dac11de7f699397f9214b3a1e35e33655f023e6bfd9f6d03c3ca50ce694a1bb9a2fc7bd4afbcec0eba8d2da168ed223eac58b0db7e5153bb224903325dfbb98207522518a7ee51b14a321a824162b9508374b810308ad559d898b4fe962874a523d999a8ccf70b7e3f8f029bd48e0ee58eeaae74ca79c102e38880fb143b84499ab3dbe676571d57bf59d0d836a7489658e9607c671269979b6a80ff2e760934a812c623ec618b9c82d1f085390f3340e31baf30b802e3766fc947bfad86686a3198073866b118a61762d13bc5db6568c8765d5f62b3d868b821ff60752f380e6f3afebc37f0391043fc346c72de52895e918fece819a31cbab22c0a643b5905b4e7cf3251fd6f123d770d4a69a2bd2857a1a4b4b1185b42a4a8af6604c368423b8d23c177d35bf8237fe4d7050e0c3673359c27de25cd74ad36591b8478137d5927516ddc962a116c5b2f7e2c37a9aa8236efc5179f30a047fa01401279d678634cd68ae8c6d0a2d7009e68ea9585dc4f7bc785cbda95a91c7942c8841497a7c60d2b1442aa8efcfac3b6666b58a3012fa3390c48e76ac7281cc411b391104520bbe0c70989454384dc960eb343c95aac168c168ba71705655b2a31dd875aea25259c44d36f6ea8d04c6fda676918771ff137d791cec9a93b7ec6583739589f9a663d7c6d2fdf5516b028f36849892a55dc520b8f87f99d5e25b15bcf37a46ed699ddcfa9ea5b6f45199439c46affa316419c3b6acd69e39dcc51b6652ae09c5e8ce3b4b459a2e4efa82a44df71933f708fe163359d53e08b2770387b1b9a26343c63f97eeee5f4eb9730fe406fad5f65c9d34a69a5ec825315d0edb57c0b846c9f1de65f511ec3b4fb9ce59f46df357ba1b7d32a56ca936d28cf08b2054f27d8ca4f7641b8e84f374a1aaab5a65344ff77e9aa669565b046fef6136224daab5454bbe1fb9998b4fa439e06746de194b9d8cb1151dfe31edc39da2c3628e9ed3446bf580e9625569467f6ffc0ec6ce8d5d39a66bd9471523150478316ebb2b32bfad7ad2eaf2588020c56fdff80d0b088fbe2a58fd7c77abf97af576a727d313d1c003f6d1b237c6e4eabea6a0277888a85c995d28d61ca388dd941c02cd5313b1d7a03ec827380466e081691ca92a812bceb46688cc15a05ee09a073177f037a6f4b19536fad97ddc094e216cea4f9b7c4294b12220b9fa618a1943a9a75614734fb2548d9b729fa605f398f72a463261053cfffbb93c36b6461a0a808891ac39f632fa7864eee1351ffd516bf3bc25d75f22d9c0f2c968690659e22c824ad6c50e4c64090a7d20b757d224a0ccf5ce1441ad3802b3ae0affb83b17f4ae544e08f63b4d72281ba1f7ba2c4c1bc043868fbcb8a33a33f42cfd62f7a14579333f600e8dd114b916c15e7b7b2dcb9ede1566407209599764ea5c71e0a8e10c5f06c69c2ec2fd41b4b5756a5639b33cc2a47c9328be6842088d798808971c4ec9dae27c99c0440353116a86740abd8a3f42273f40bd1b52caeff0dc64050ea6a2d0f5038597647e2d80b2ee271e9fc42d5e0cc7adba04c0c0bbd8e1c6319bb3d7b929593d2366d9150b93b5265ff3a3d8ba3e47065f2b1bd54f54b17c5646f0f02ef0ac50828a29f826b96a840123b48f9aaa40299cdfb66da1583897bf0b0e670fec06e711c8203182eb68fa60ecf2789763f9b4e6b2c13fae7dc62339f56903cfcff2a7a249fefefdb4be022f75e8061e698638d0aa2b6efe2ef8354ca10e4dd03b8720d421cf2778cea81e421679b93aae0aa4f7377fbd76b0bfa1ad7b6654136124502ba2e4d709144cd927770a47ec9377a14cb12f3f8843183dc8c84200070072240220bdab5f0cd984075ddadc271498d8731769366825d2c7e2c5e8ccfeffa2123bbf73e2fbb550bc6c0209bf229f2f6c8303dc2a26fbb854ce3672e80f2e00be7f6c3c87a5a687886669144c7005c2a655f9737cade927c1292d46b79a81de75ce8653204c3fe61a98ff71822bfdb502e95eafda57174361c58913ec268f6bd55087a93449baa65a04995a99d34280c80932722aa31d04ac94083316ebe7164e42722560d5b4716f2a643b9b74d4fce2a35b8625a533dec892a807943004ac70b135990c940e2c4991405d34152f6e60f1c6fb27807f189a3ad461407e48ea6ebe01b49074ce82e4526a713468551e5c62ef40efd6c15f54cdd5db4840e2ceb52364dcd127326f6449990bd89fc3c9155e3614daa8c1f48ad970910a4c259269fd2c3e2a94d3a1008371940e333f61ab6bc3146e4f7d9609ad68511075cebde259d4c891af8151f2080b091764a246bf16c174ca013daf1ea4b522ef2eecaf92fa595c94e7346d228eb36c98eed9d29b912151431128a3eb193f9252772f734c77577c208d353e620189b671e8ee2d15da2148650d3b70d7f5b87103c33c7fb42ed2578dbe583364a037e0fd5522ed75696e4774c58720c7b61b546a9c11257f7ccd53bcef0fc7efec5727a23e803e395067a33a64dca5eb54afa75d202c06702922088e12f97979773d4cf8b4680dc1118f31631e3af1bce9bb7e30f46b0cb0a651ee3e9494c38edab5dbe9b1d72b9f6f4ec3cb002f77bc0557d6ec1416f4ad472d6d8da940d046a14329dbb846da99a16cd9a4db44854e7bf9c5a76f579f9d4e40aa2d828c46bd70a7b04db3fd700aa3890440d4c7bf2aba5a0b0017d6d658efd46cd3c6eab1b67c7f8159f3b7c512aa639fc4bac9fc4fe867705b9880ec1e4b05145cf871d50fed22fec4e1969c06504381931c459a0c987471c59ff9acac8216b8ee1b84c3d7311a04e11985e2c5bda25ef566d6296c81e6ff7b7f23a8bbfbcc8e93b4ab91b9c7279d705841240ece1c97aac422718d6900435e21aa558eb0f9abfcf50b36ba84bf498a9fa0e41fa2ab4cbb9b17a61d81ba4438efcab6404346e007179faa1c111546e305e14db01c2c778372735d5636e25a1bfe5e57dcd4f85b57d92c79190c628bec1b7287e6743254fe0cb1db1b1b0293981492a5889b560d5e736e38d7b8ed2e3e0c7db3f28c9f2080eed1e114835bfff13072b2936f705a3b83442c08b3c622aad3e0ec349ef4bf0595cb658b271d89dd7f9621b24ed89e24a86bca8fc17c65a39afa3c47d16f7353ca9e7b72784e437493af78e5db18d521146e379207918bd677e6b8c36df6e0ba2bcaa3689c640923cdc928dd2f0a373629c408a81ffe8fde5551cf39ed5d0f9fbc5886baf9698a14afdb9d9b664a4d24eff29473172f723c3c5eb03fb0096ea92865e32c62f5b30cb71f5512e1fa290b03de7c464572a7996bdd302fae9abba58e38675027757fd2f43b60ca7d6fd956933a5349ad6e84989c2c97a8447832c0348f17cdc8a3cfac0811e2b1187cb067e7863b5248580b58002263c717ccc92b99651b2283272e1299193e5a446acdc515b260bbda6f35a1d85c1221e2234b5a5afb0031608aa246b1c88e3351fc825856760216de50e932244a2fd32f288d69792daa46798723d50b3a977a988b9cf5d0114bfc2a289c076203aa1c7eef69b9e8d398e1fc12a1a3ad4e3f98a7dadab794dd711fe82dbe0ceb92ebc340becef2002613e11f805a186f31600a4ef1aa0811815863ede83e7bab3bd1edeef7dd696a7a0f2ce788f51225e8fb424668f78a3dfc4d144667d6dc9299e502b540ff9fd13d3b0e3d44fe26cd04893bfc3d2e70412fe22e77c4e5d824184a3ed7151aad8914b7cc59e0bca632f1bb48a1e07537db6b399c7d023e6f5cfc21955c55385b7f8d93cd0c8c90eb12c672a70df7c3d0bb33713c37da1a2403e6c94a86cbfe30387318979e248b34002028e71a4d8b2486d4040ca3fc76bdb949bef265a6ea9f1a31812d1971f90dd4d9d2cb393c76f0c7b2055333a7c52042cf2d2409c91c7bd7b125df481a29cc7a24a7199cc91aed0e14ec4ca81ebd85849972de9d56e060730a68983d71fb3da31d452aabdee3775dcab5d56d7533f5129b894179b24574968d03c0b2315cc21b2421ad06b428f1d7921c06ce735f6cf8deac694937231344d154d9784f9ba495bb77041cfc871963d9e54afcbd1343788c4e66890bccdac8c7eaeb9801d985a3b1b3b079244a0aa01d87ceebdc2cf8f4e3216b5200899d9dbe87ac82301ee57ea20f138f85503c29ebc3e93fa4260cb842f62141c9ad52092283a8a1b7bd1e6f64a146ba5022917a9bccc5f612bd175097c86d6f5d0dbfa3ae91ccb063a88edfabfad77f260ed2155583c98514c9f9204890ea87f2580055e2d4888a51ba6e398119719ed78e223e387cf04e8dcbf2289c46894ce82375d80e564cd74a657f5e12ccd4cb2fbf36e6851146e916a42f87c2e0744339485c9508112f6c914a4f2fba0611cd06a82585e2892de94e38ced5c530908c607e01d56084081970170cab3877543413eec7f0b5f14cf7364c8737718eb7c2ebee874f77caf4db56c57274d8968d682303ee6c213bc8c3d67d84c1759f92a8568db474af4a7f57d0ee42d1f03577d4499ab789ead2de14690ca18f53b4b4548f15317964e9f12e2ddaf301418ee25e6039fe81fb410b6d878fe126a9a3885bd4fdaba6225816b6a2c8e0190be06a5dd484d91add3b1edeeec2f57af131472ca7717e5fa922805615ffeccf92ff9ee25bc31333c71f0c629485be5502cba04d9d17c69546c00b14c9b1cc12518360d6d80cba49ec1afa394e081eb91d05327bb5bed96867a23ab8d22488f95a8e29a0ca2a100e9a5b44c721c19d0e5cde1fdad", 0x1000}], 0x1, &(0x7f0000002080)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x7fffffff}, @assoc={0x18, 0x117, 0x4, 0x800000}, @assoc={0x18, 0x117, 0x4, 0x1f}], 0x60}, {0x0, 0x0, &(0x7f0000003340)=[{&(0x7f0000002100)="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", 0x1000}, {&(0x7f0000003100)="a77c4ddde9491b9ee49b5cd5e1d8d5d18cb9b64958976e9ed0a54167fd2fe08b9054e147c3c1e08cf1baad5f40c988d3ef1ca6da28450bea3a00b009abb93fe19b38d7b4b9e7d7e94171ad091e1488db454544b11d3ee8849e902a69026889ac4041c47df36ebebbe52ab2ab691b1c8728e6c43f28fc70e0869bba38b1", 0x7d}, {&(0x7f0000003180)="876d7edb5425178157cc68e94458394a98ea21695ddc7561284ccc430ee74d4122c1e25e4a4c95609a28497663d41af32bb3439acb63f995ea7fc586648c38644545287a8e2383d79ed51481718fd92f887bfcd956a2093b8a9a6757c60869d261ff23bba0471187f733fe0d46e06f3a89673d968906c426cf61b4dcdc85e315ddc14c3c052829c834cdef2a9e9361e2f2fcd71d632cccaa1127c2b0f0963f0d59f88548a5d0cb864abef742353fedaeab3b700b18def3364dad60850039ddfbbc689103386f2cff523a9c534e9bf4", 0xcf}, {&(0x7f0000003280)="9136c740057a970036a5e6d75c2fd420dc43bffd73f889ffcada904382312bfdf14fcff92aa2b1064be1b19294272d7a7c258850364b2b75b48e7ae94404e330c22c164b882e146b1c95e447f09348e43859210af173f574515f071daf67b72ba99f623ad4c18ee3334fb92ae6c7050ccd40673fb9af52f56c686816001a2a4f0fe82f0c9205a692b79178", 0x8b}], 0x4, &(0x7f0000003380), 0x0, 0x480c0}], 0x6, 0x20000094) sendto$inet6(r0, &(0x7f0000003380), 0xfffffffffffffdd0, 0x0, 0x0, 0x1201000000003618) write$FUSE_INTERRUPT(r2, &(0x7f0000003540)={0x10, 0x0, 0x4}, 0x10) dup3(r0, r1, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000003380)={0x80, 0x10, [0x7fffffff, 0x4, 0x7, 0xffffffff80000001]}) [ 1374.512638] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1374.914046] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x40}, 0x28, 0x2) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:08 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:08 executing program 5: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000100)) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:08 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) write$capi20(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e21, 0x3, @remote, 0x100}}, 0x1, 0x0, 0x100000000, 0x6, 0x60}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000100)={r3}, 0x8) [ 1375.040177] net_ratelimit: 36 callbacks suppressed [ 1375.040183] protocol 88fb is buggy, dev hsr_slave_0 [ 1375.050376] protocol 88fb is buggy, dev hsr_slave_1 [ 1375.051743] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:08 executing program 5: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x30bf3e94) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000003c0)={r0, r2, 0x6, 0x2}, 0x10) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) shutdown(r3, 0x1) [ 1375.085660] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = socket$inet(0x2, 0xa, 0x9) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000100)=0x10) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = syz_open_dev$vbi(&(0x7f0000000c40)='/dev/vbi#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000400)={0x8, 0x0, 0x0, 0x401}) ioctl$DRM_IOCTL_AGP_BIND(r3, 0x40106436, &(0x7f0000000440)={r4, 0x2}) ioctl$PPPIOCGMRU(r3, 0x80047453, &(0x7f0000000c80)) sendfile(r1, r1, &(0x7f0000000280), 0x3) ioctl$VIDIOC_S_FMT(r3, 0xc0d05605, &(0x7f0000000300)={0xf, @sliced={0x9bd, [0x100, 0x0, 0x3, 0x9, 0x8, 0x10000, 0x200, 0xe44, 0x1ff, 0x9, 0x10000, 0x4, 0xfffffffffffffc01, 0x7, 0xe2, 0x4, 0x9, 0x7fffffff, 0xc856, 0x6, 0x80, 0x6, 0x0, 0x2, 0x40, 0x105, 0x3d, 0x3, 0x7f, 0x3, 0x77dc, 0x9, 0x1, 0x3, 0x4, 0x85cc, 0x5, 0x0, 0x401, 0x2, 0x72a, 0x1, 0x40, 0x7fffffff, 0x5, 0x9, 0x81, 0x5], 0xffffffff}}) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) getsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, &(0x7f0000000240), &(0x7f00000002c0)=0xc) r5 = dup3(r0, r1, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000480)=ANY=[@ANYRES32=r6, @ANYBLOB="06000900030000000004ff030000200000000700fe03591bf59aa495d90544c20c29c8887b17616c906035940f2478ab00000000000000"], 0x1a) 08:42:08 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r2}, 0x10) [ 1375.229522] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1375.289384] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:08 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x2, 0x200102) ioctl$TIOCCONS(r2, 0x541d) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1375.456161] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1375.510122] protocol 88fb is buggy, dev hsr_slave_0 [ 1375.515312] protocol 88fb is buggy, dev hsr_slave_1 [ 1375.830318] protocol 88fb is buggy, dev hsr_slave_0 [ 1375.835471] protocol 88fb is buggy, dev hsr_slave_1 [ 1375.840647] protocol 88fb is buggy, dev hsr_slave_0 [ 1375.845732] protocol 88fb is buggy, dev hsr_slave_1 08:42:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0xc000, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r2, 0x28, 0x6, &(0x7f0000000380)={r3, r4/1000+10000}, 0x10) r5 = syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x6c84, 0x82000) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) write$eventfd(r5, &(0x7f00000002c0), 0x8) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r6 = dup3(r0, r1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e23, 0xe1c7, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}, 0x9}}, 0x8, 0x800}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000240)={r7, 0x4}, 0x8) 08:42:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = socket$inet(0x2, 0xa, 0x9) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000100)=0x10) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = syz_open_dev$vbi(&(0x7f0000000c40)='/dev/vbi#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000400)={0x8, 0x0, 0x0, 0x401}) ioctl$DRM_IOCTL_AGP_BIND(r3, 0x40106436, &(0x7f0000000440)={r4, 0x2}) ioctl$PPPIOCGMRU(r3, 0x80047453, &(0x7f0000000c80)) sendfile(r1, r1, &(0x7f0000000280), 0x3) ioctl$VIDIOC_S_FMT(r3, 0xc0d05605, &(0x7f0000000300)={0xf, @sliced={0x9bd, [0x100, 0x0, 0x3, 0x9, 0x8, 0x10000, 0x200, 0xe44, 0x1ff, 0x9, 0x10000, 0x4, 0xfffffffffffffc01, 0x7, 0xe2, 0x4, 0x9, 0x7fffffff, 0xc856, 0x6, 0x80, 0x6, 0x0, 0x2, 0x40, 0x105, 0x3d, 0x3, 0x7f, 0x3, 0x77dc, 0x9, 0x1, 0x3, 0x4, 0x85cc, 0x5, 0x0, 0x401, 0x2, 0x72a, 0x1, 0x40, 0x7fffffff, 0x5, 0x9, 0x81, 0x5], 0xffffffff}}) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) getsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, &(0x7f0000000240), &(0x7f00000002c0)=0xc) r5 = dup3(r0, r1, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000480)=ANY=[@ANYRES32=r6, @ANYBLOB="06000900030000000004ff030000200000000700fe03591bf59aa495d90544c20c29c8887b17616c906035940f2478ab00000000000000"], 0x1a) 08:42:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x3, 0x345004) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000040)=0x81, 0x4) dup3(r0, r1, 0x0) 08:42:09 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:09 executing program 5: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:09 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) write$capi20(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1375.920128] protocol 88fb is buggy, dev hsr_slave_0 [ 1375.925275] protocol 88fb is buggy, dev hsr_slave_1 08:42:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x8}, 0x1c) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000100), &(0x7f0000000200)=0x30) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000180), &(0x7f0000000080)=0x68) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x0, 0x3, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) dup3(r0, r1, 0x0) [ 1375.983362] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:09 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaf1) memfd_create(&(0x7f0000000080)='tls\x00', 0x1) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xffffffffffffff26) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x2, 0x200102) ioctl$TIOCCONS(r2, 0x541d) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1376.064393] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1376.081243] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000100)) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:09 executing program 2: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1376.173921] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1376.245682] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000080)={0x0, {0x2, 0x4}}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000480)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80, r2}) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x800, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000180)=0x7, 0x4) dup3(r0, r1, 0x0) 08:42:10 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x40) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000180)="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", 0xe8cb, 0xa323f2ead7b688a2, 0x0, 0xfffffffffffffd7c) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) 08:42:10 executing program 2: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:10 executing program 5: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r0, 0x0, 0x0, 0x80000) write(r2, &(0x7f00000003c0), 0x371) read(r1, &(0x7f0000000200)=""/250, 0xfa) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x805, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r5 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r5, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x0, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r6, 0x1, 0x0, &(0x7f00000000c0)=0x2, 0xffffffa7) r7 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r7, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x20) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r4, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e1f, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r4, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r4, 0x1) 08:42:10 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x400, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r2, 0xc0305616, &(0x7f0000000100)={0x0, {0x5, 0x200}}) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:10 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:10 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:10 executing program 2: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1376.959458] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:10 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x10000, 0x40) sendmsg$kcm(r2, &(0x7f0000000100)={&(0x7f0000000180)=@in6={0xa, 0x4e24, 0x2, @mcast2, 0x100}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="4763bd7f7f29eb88132447c9b2e460fc9278d1035f604c0993e0bd83ea5790cebe11fd80704d4855c12e01738322da43d8564ea33433c7d77d745ef130108eef6dd0ae225187fc90b8f366467257f61549daf1581bb9", 0x56}, {&(0x7f0000001380)="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", 0x1000}, {&(0x7f0000002380)="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", 0x1000}, {&(0x7f0000003380)="3d965f2144d5d73d5e5dc6d0bc58df2d6f8341cc64d3a165c79f2670694d0eda052c06f2690422f9a47a049b922d742a4c39df056266b424e80a973f84a3f528a5d5eefd4cda923f175d21cd8f2a397526ff656d0de067ad59920ba1ee6f6b01d2499500da316bd74ed37a0f712d30c780e2ffa0d45f70004254f70ff0074dbe229d64e25de58333131e640fc21565084dbed4517af4cc810f7b4e3b09f30685f967ffc1e21a2a7455da8e254f3d4647a1b1b49e5dfdfe23b51342306417b684fe7049a2e5c81acf452277a9387e10", 0xcf}, {&(0x7f0000003480)="c64b8887d67897ed2f82556eb05cecf2799d4ee98508064a8a048ac43118ace9c482e81a31d411ee704fe66bcb67a2f695044bcec69982015c84663e8661d03e74b971fc393e3addd123027277bfc994b18e6f50d6435eac8e7d43a8d42c37d5193b65a65a5807c56ee4be48898781d01ba17fe2daacaf5bfd210a687e564fa687da4182d828ae232ce60a3814597d5e43ee98e24e7c0e5dbffc2ddeb850bdf3535c6bb76831241ec5c3a722402e40cac3fa341f3c", 0xb5}, {&(0x7f0000003540)="07543b91b1bbed0f1d654be3c327c4fe4937b0fd5fb56d371a4020f7926dc67cbbf39e8e0c1982e52cfb091ad562aee9912d472bc9af91c3d5adf5629f2643c4ec32b60ad152c5c423a1cfa9f7a30cd312dc080579d8b34ca84c0f0ea2b274810573e3bd570cce0f5b81b38f5b12999a3d9bc4d39a8da9e380d715293749031a86b435b01b68967fbc779589d68281c2be1557a831c84404357ad3c9f0379b83b39affc8a43d6a761c535d14e366ed47e1c630c7d4cce6d2c98f47944ec9c62ac019ad8397993c47c639d8897225413c5445784537bbecaec8ccb019c0368674f4e83fe96683ddbe2ba7c13947151b34ce2949", 0xf3}], 0x7}, 0x2000c000) syz_open_dev$swradio(&(0x7f00000036c0)='/dev/swradio#\x00', 0x0, 0x2) sendto$inet6(r0, &(0x7f0000000240)="fc30723e934fde3dcc78f6061e098a9e6c93bba03676f5446b0d4e0338aae7c9c06524a247c1a134b40e29ace1daa0547f99fc40786136ae0ddae4d1af45c7a83216febf612cab960c0b1ad5e0f947770d96647ef6f66f8880c059aaf41a793493753c9962faaf1c7a0079f782d32588eca3d5031704de260cd7908f42394f9cb3084912a67185e90d06f56f3d682fe6f1cc9dca8d92eb2eb98801329e45d17f3e17873e5c7bd65ae45f022dd3f7a6695049", 0xa6, 0x0, 0x0, 0x152) dup3(r0, r1, 0x0) [ 1377.172955] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = getpid() fcntl$lock(r1, 0x5, &(0x7f0000000080)={0x2, 0x3, 0x5, 0x1000000000000000, r2}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000180)={0xfffffff, 0x6795, 0x0, [], &(0x7f0000000100)={0x9b095d, 0x7bad, [], @p_u32=&(0x7f0000000080)=0x101}}) 08:42:10 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:10 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:10 executing program 2: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x400, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r2, 0xc0305616, &(0x7f0000000100)={0x0, {0x5, 0x200}}) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1377.774995] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1377.778431] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:11 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x81, 0x200000) ioctl$TCXONC(r2, 0x540a, 0x40) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000200)="910001bb68641d2bdfe033da18ce3aa2428d662c46e586c47a58cac93fc41d030096c71214d099bbe738d3e7ea0a4a79805391a30a12b0ff531182bf19da38dde3ce267fced569602f4339a0c58d6b7b660f5333", 0x137, 0x40014, 0x0, 0x0) dup3(r0, r1, 0x0) 08:42:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000180)={0xfffffff, 0x6795, 0x0, [], &(0x7f0000000100)={0x9b095d, 0x7bad, [], @p_u32=&(0x7f0000000080)=0x101}}) 08:42:11 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10000) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x4}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000001c0)={r3, 0xffff}, 0x8) dup3(r0, r1, 0x0) 08:42:11 executing program 5: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1377.978987] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1378.023020] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x8af2, 0x400) ioctl$VIDIOC_SUBDEV_G_EDID(r2, 0xc0285628, &(0x7f0000000180)={0x0, 0x6, 0x3, [], &(0x7f0000000100)=0x3}) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:11 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000180)={0xfffffff, 0x6795, 0x0, [], &(0x7f0000000100)={0x9b095d, 0x7bad, [], @p_u32=&(0x7f0000000080)=0x101}}) 08:42:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x3, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={r2, r3, r4}, 0xc) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:11 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:11 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1378.658910] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1378.672166] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1378.677987] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:11 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000005c0), &(0x7f0000000600)=0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x1000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x3b6) sendmsg$inet6(r1, &(0x7f0000000240)={&(0x7f0000000080)={0xa, 0x4e22, 0x101, @mcast1, 0x59}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000180)="88797ca0eaf426d71843f80e50262e10f867b8240553016907223b75b7809c55c9410c89d50ad85a5018835944bad63fee61ac252d7d3a6b6d7e32d5758475a7a291b8f70303d3ede6829415af5bb1066d5091ed7cc4035bc6184c03ae737fcd3f2c46e0c938fb747b41c5e90e1502d8d8464cf814bbb82f199303a9a85a7113b703a225ad7a1da837516e5a260d57a94b0d9917cede8fce7e2f97d58d97c24359bb6d4d6a281e12ab80f423187b", 0xae}], 0x1}, 0x2404c000) r2 = syz_open_dev$vbi(&(0x7f0000000440)='/dev/vbi#\x00', 0x0, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f0000000580)=0x8000) r3 = dup(r1) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000480)=@assoc_id=0x0, &(0x7f00000004c0)=0x30c) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000500)={r4, 0x8d7}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000300)={r5, 0xdb2, 0x5, 0x7}, &(0x7f0000000340)=0x10) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r6 = dup3(r0, r1, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r6, 0xc0106401, &(0x7f00000002c0)={0xe, &(0x7f0000000280)=""/14}) ioctl$TIOCSPTLCK(r6, 0x40045431, &(0x7f0000000380)=0x1) ioctl$CAPI_NCCI_OPENCOUNT(r3, 0x80044326, &(0x7f00000003c0)=0x80000000) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000400)) 08:42:12 executing program 2: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x5, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x3ff, 0x8, 0x8, 0x8, 0x1cf7, 0x1, 0x1, {0x0, @in6={{0xa, 0x4e21, 0x4, @dev={0xfe, 0x80, [], 0x16}, 0x5}}, 0x0, 0x101, 0x3, 0x4, 0x3ff}}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000240)={0xfffffffffffffff7, 0x7af3df1510f863c9, 0xffffffff, 0x13e3, r3}, &(0x7f0000000280)=0x10) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) fsetxattr(r0, &(0x7f0000000080)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000100)='\\vmnet0)md5sum\x00', 0xf, 0x2) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1378.905863] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1378.965942] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1379.051319] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) prctl$PR_GET_TIMERSLACK(0x1e) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:12 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:12 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000001c0)=@gcm_256={{0x303}, "b7bbeb93b0c21b6b", "54b088b99fcb2368381d600ca85560bc6be9a5bec0e78e82deed10ba6f72e140", "056d0353", "c27b433fbdd06020"}, 0xf285e0ac43198666) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000080)={0x0, 0xfffffffffffffffc, 0x9, 0x80000000, 0x3f, 0x800}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x574a, 0x10001, 0x4, 0x80000000, 0x1, 0x7, 0x3, 0x5, r3}, 0x20) 08:42:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffb, 0x5, &(0x7f0000000540)=[{&(0x7f0000000180)="9a798e21ddaeb97486c3563e8c2d3d6d5eda642020ee7c5109ae398b18d40646be10f2325a6382420482d21e97499fab81bf9098b4a77ce3fbb543887424449a7f4fba1e2aae86b65f5533460f05227471530fca12c04d431948dcd719bfd29747b0865f3a9d4a97f982379f191c704492b28e8ca139d06212aa9bfc315cc0829c64da2c644f56f0891cd6188fa3fc4500397e492822e81425a607d823177888221c7c32fda256b6f9b9c78c75ba2e6e25ed2fdcd30a63530fa098280a1451ca6ec5d405c08c52a32ce232aae1ee4f5c759dc42de40a6acd816a48", 0xdb, 0x1}, {&(0x7f0000000280)="ed7e12ebd84f3c2baf05bc33cd8f153fd605ee28e7cbf1c5f0bd12a9346e44ae3e4223224335206c886090c8f6ba460727f9978ba332326b16af44f73cf2e1f485f9ecc46aff2972831664bffd5e713b03d91d3953853c4a91ea184f7da1dfbcc11e9d87cb0f0da8b2e589365a476a600a80f5d3c48a1e4e71fd82443dc3e6f9fe6d796b871d", 0x86, 0x7}, {&(0x7f0000000340)="9cc1e2c0c82f63c211fd698898a271deb7fcea0aa842e9cdc8ae567128030972fb9afc0a7f4a8b393ffe39608903a6e836f89359a657255e515d91cebb7a6813d70cc96a7cc2c3a0ec330125906aba5955eab0482a052ed94f", 0x59, 0x9}, {&(0x7f00000003c0)="b15cf03807255f008410311b200963a9654315f8bd61aa87fc341e820c52acb26e28218a86ab19ea86549f6e324080c25bc68ccd428bbdea599777d8fad66f9e86a9305ef2aaf9c3bd8fe13fc5df4fa2c083b637e17169a370663f5f77c315953b70086e7ee749f943a16eab3d3aa951563baa3ead3c6c501ca334e7608b426fc8dfe447908878f5f162806eefc024b0e869480ec4f47c961ac8ab7caf6ae11ea2e406e87bbe831ac0a891463cd8bf064ccf1c4643", 0xb5, 0x1}, {&(0x7f0000000480)="284323306e50b091868b3d9f1050227bb6c382592c1ac4aa9135aae06c850e3e82fe74faf7010b54a7ea716d3b297751a053c11899374767b514bc45d78c4c1e95d5fc6ce7e18be9188c17d8754c5229df6969098fddc13f8ef8af7bd69d9fd51865099c28ae6b38e1d287518fd45835fb9474c92fa025c3e03da4d3b212ca599da0666df1379a9731969a5d8381a28b29c54434728c6abdb096d7dbf56771cf8f2254ec67ed67c1a2aff2d3eb0d23606ee0", 0xb2, 0x400}], 0x862002, &(0x7f0000000680)={[{@fmask={'fmask', 0x3d, 0x5}}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x3}}, {@disable_sparse_no='disable_sparse=no'}, {@show_sys_files_no='show_sys_files=no'}, {@disable_sparse_no='disable_sparse=no'}], [{@audit='audit'}, {@uid_gt={'uid>', r2}}, {@audit='audit'}, {@audit='audit'}]}) 08:42:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) semget$private(0x0, 0x7, 0x21) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r1) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000280)=[@in6={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x3f}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x2c) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = socket$inet(0x2, 0x100000000805, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r6, 0x84, 0x76, &(0x7f0000745ffc), &(0x7f0000b96000)=0x35b) ioctl$VIDIOC_G_CROP(r2, 0xc014563b, &(0x7f0000000100)={0xf, {0x7fffffff, 0x10000, 0xfffffffffffff568, 0x1a04}}) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000002c0)=@gcm_256={{0x304}, "26d44e4b991df6bc", "0356390752896cd68e0f756562b511f4733f65a2688c2b4988fe38acf8e44dc4", "a4b92010", "a4c2849ec395ee79"}, 0x38) r7 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r7, 0x80404506, &(0x7f0000000300)=""/104) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r1, r2, 0x4) [ 1379.532518] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1379.544260] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1379.561082] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:12 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:12 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:12 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) r5 = socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r5, 0x1) 08:42:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffb, 0x5, &(0x7f0000000540)=[{&(0x7f0000000180)="9a798e21ddaeb97486c3563e8c2d3d6d5eda642020ee7c5109ae398b18d40646be10f2325a6382420482d21e97499fab81bf9098b4a77ce3fbb543887424449a7f4fba1e2aae86b65f5533460f05227471530fca12c04d431948dcd719bfd29747b0865f3a9d4a97f982379f191c704492b28e8ca139d06212aa9bfc315cc0829c64da2c644f56f0891cd6188fa3fc4500397e492822e81425a607d823177888221c7c32fda256b6f9b9c78c75ba2e6e25ed2fdcd30a63530fa098280a1451ca6ec5d405c08c52a32ce232aae1ee4f5c759dc42de40a6acd816a48", 0xdb, 0x1}, {&(0x7f0000000280)="ed7e12ebd84f3c2baf05bc33cd8f153fd605ee28e7cbf1c5f0bd12a9346e44ae3e4223224335206c886090c8f6ba460727f9978ba332326b16af44f73cf2e1f485f9ecc46aff2972831664bffd5e713b03d91d3953853c4a91ea184f7da1dfbcc11e9d87cb0f0da8b2e589365a476a600a80f5d3c48a1e4e71fd82443dc3e6f9fe6d796b871d", 0x86, 0x7}, {&(0x7f0000000340)="9cc1e2c0c82f63c211fd698898a271deb7fcea0aa842e9cdc8ae567128030972fb9afc0a7f4a8b393ffe39608903a6e836f89359a657255e515d91cebb7a6813d70cc96a7cc2c3a0ec330125906aba5955eab0482a052ed94f", 0x59, 0x9}, {&(0x7f00000003c0)="b15cf03807255f008410311b200963a9654315f8bd61aa87fc341e820c52acb26e28218a86ab19ea86549f6e324080c25bc68ccd428bbdea599777d8fad66f9e86a9305ef2aaf9c3bd8fe13fc5df4fa2c083b637e17169a370663f5f77c315953b70086e7ee749f943a16eab3d3aa951563baa3ead3c6c501ca334e7608b426fc8dfe447908878f5f162806eefc024b0e869480ec4f47c961ac8ab7caf6ae11ea2e406e87bbe831ac0a891463cd8bf064ccf1c4643", 0xb5, 0x1}, {&(0x7f0000000480)="284323306e50b091868b3d9f1050227bb6c382592c1ac4aa9135aae06c850e3e82fe74faf7010b54a7ea716d3b297751a053c11899374767b514bc45d78c4c1e95d5fc6ce7e18be9188c17d8754c5229df6969098fddc13f8ef8af7bd69d9fd51865099c28ae6b38e1d287518fd45835fb9474c92fa025c3e03da4d3b212ca599da0666df1379a9731969a5d8381a28b29c54434728c6abdb096d7dbf56771cf8f2254ec67ed67c1a2aff2d3eb0d23606ee0", 0xb2, 0x400}], 0x862002, &(0x7f0000000680)={[{@fmask={'fmask', 0x3d, 0x5}}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x3}}, {@disable_sparse_no='disable_sparse=no'}, {@show_sys_files_no='show_sys_files=no'}, {@disable_sparse_no='disable_sparse=no'}], [{@audit='audit'}, {@uid_gt={'uid>', r2}}, {@audit='audit'}, {@audit='audit'}]}) 08:42:13 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:13 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1379.811146] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1380.070143] net_ratelimit: 26 callbacks suppressed [ 1380.070150] protocol 88fb is buggy, dev hsr_slave_0 [ 1380.080210] protocol 88fb is buggy, dev hsr_slave_1 [ 1380.390190] protocol 88fb is buggy, dev hsr_slave_0 [ 1380.395292] protocol 88fb is buggy, dev hsr_slave_1 08:42:13 executing program 5: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:13 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:13 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:13 executing program 2: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x10100) setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000100)={0x3, 0xcb, 0x6, 0x200}, 0x6) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000180)={@multicast1}, &(0x7f00000001c0)=0xc) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup3(r0, r1, 0x0) [ 1380.527301] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1380.567392] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x101, 0xc000) r3 = accept$nfc_llcp(r2, &(0x7f0000000180), &(0x7f0000000200)=0x60) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) readahead(r0, 0x3, 0x9) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r4 = dup3(r2, r3, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000080)={0x1, 0x102000}) 08:42:13 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:13 executing program 5: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:13 executing program 2: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:13 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:13 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1380.703630] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:14 executing program 5: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1380.790154] protocol 88fb is buggy, dev hsr_slave_0 [ 1380.795280] protocol 88fb is buggy, dev hsr_slave_1 [ 1381.270203] protocol 88fb is buggy, dev hsr_slave_0 [ 1381.275316] protocol 88fb is buggy, dev hsr_slave_1 08:42:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r1, 0x29, 0xef, &(0x7f0000000180)=""/122, &(0x7f0000000080)=0x7a) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x54559357997ab78b, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000100)) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:14 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:14 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:14 executing program 5: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1381.440850] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1381.485050] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x1d}}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:14 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:14 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:14 executing program 5: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000480)) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="89079ddd05ea25db5baf0927123ddde36245bb777705e07ce438563d540d07aa79f40cf8842b86afec7eb014d0ea05639de67480fa51d50fd95dd2d59ee960d234c37c589a6e464733908aa1290178c473df6e1256d41f7284334656257fdd2c2196979f7becf607eb7b102238bb1dd2c5d74514b419075ee33350e273a8091a6a46cb5cc1265a6e7bd1c41147", 0x8d}, {&(0x7f0000000240)="3ab135f319a7f9534ff6fcb6e53e817d3e0c25ede54a5b7a5ddf5749003d1287572d4b1c28ec0aa790acf01a835220cb102a7e8b94d43d9f8118f83dd9b51e1e0b5e32ebcf712f53f8b9e771cb810fed4d685a9a090d0990d3bfd36b3ea93b3b44d3bc97", 0x64}, {&(0x7f00000002c0)="4552c749390eebbfe6c909a8499fe58ac78cb105b0497ff772cc46353c8f1bfea8f367849fb3e7ab35b484894fbe29daf04e925f385a52c46d5a9f252e2efa3dc41b26d4435ddb839283ad98f02b5c5c8e941b53a2f42b953b184cb6082ab70a45c26a7b232805e01b73366a773b3891d56055d4110d8ccf50c79e2e4d6f44c80a8f64c57e5e8b0c932c5bf7cbd7a622f50009857b0d7f1907e862c218aec209461dd8bc8f046989a38dd36146cccd4dacf0a032ea6a2729127f7b463d", 0xbd}, {&(0x7f0000000380)="b2d43a6c9d0bcb0374582262964f137edf420f21b0d305e37a0e67acbc1cd0e7080f0d0b6323711ac2de57cf1348e62cc3e10ba4cfbafb26e7721969fa9168831ba1e08e57e9284ff14ff57a7d9760de6f50b663fe37e97ef00119d4666d5210c672a690edeca7a86616e80d684e76d0a30ce735d9fd4bf0b43fa677d352f4136990962cb7969032978e95f2d25a2296a0dcf840b3b0", 0x96}], 0x4}}], 0x1, 0x4015) dup3(r0, r1, 0x0) 08:42:14 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'gretap0\x00', 0xffffffffffffff8b}) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1381.680343] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1381.750136] protocol 88fb is buggy, dev hsr_slave_0 [ 1381.755334] protocol 88fb is buggy, dev hsr_slave_1 [ 1381.800456] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1381.884278] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000080)={0x0, 0x4000, 0xffff, 0x80, 0x6}) dup3(r0, r1, 0x0) 08:42:15 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:15 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:15 executing program 2: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) dup3(r0, r1, 0x0) 08:42:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @rand_addr, 0xfffffffffffffffe}, 0x4) listen(r1, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={0x0, 0xffffffffffffff5b}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e22, @multicast1}}, 0x4, 0x4e1}, &(0x7f0000000280)=0x90) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x5, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1382.361242] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:15 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r1, r2, 0x0) write$capi20(r3, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:15 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0xe) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000080)={'ipvs\x00'}, &(0x7f0000000100)=0x1e) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:15 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r1, 0xffffffffffffffff, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1382.560167] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1382.626744] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1382.638172] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) tee(r0, r0, 0x8000, 0x9) dup3(r0, r1, 0x0) 08:42:16 executing program 5: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r0, &(0x7f00000001c0), 0x0) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f0000000040)=""/8, &(0x7f0000000300)=0xfffffffffffffec4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x54030500, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x4e24, 0x3, @rand_addr="1e543fec58b9a659948e2f2206c7eac5"}, 0x7a4339ac4efb63b8) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r4, 0x1, 0x4, &(0x7f00000003c0)=0x368, 0xfffffffffffffed2) bind$inet6(r5, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 08:42:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000640)={"174cf91173b85cf04dae71ce520cfbb388615f870a40d29fda1e9f803292114ccb69c558b803b8033488c7d77b83eca0302c6eb6b88a8c61f924de8498054f7e35d31791c709c0fd077deae4659f9987cda12a712cbdba790d6276cf961e4b02087adad4499e25d62d0434f686502e0b322ddd3a7b7418cefb1edb125543f90772547ca3a76748114a0cda531be8bbad365ab99433ae97a22d0ffcb8096a7d8a5cb55f865fdea0f9e48ab19af0ed8f52996456c5d1950fb31b2eac6784753106b6141897489e11888fc2c1ff26acf5ab9c262091de3b9bc14dd873e6c9c8dd2676e33b0e9ab1f2099d0303bb30d8d850865b0188c20c7496c2eda9b84900cda330060a0af5c7bfdd79825e2c1dd5d9ab81404d6d8e0ed7b1caa47b606d5451f5e51ce385f2d7e3a3e3388540677411efa9896159bd04bfd4eb939e038c6438142937e2f63fc835e95379cbe181fc1b3f752822ff078a2640b790c78a69c6503b93fe743ed329ee7f73b2ff4519076ac89b7f90789261449563bad5632fc09542622d8237001457c1dd6ccafd66bbacad7eba32251dd66682d0b5b823cabca557ec2f044f563b1a0a898ef58a19fdd583324c7922c2c5624de4bc70fc2ec09d7b0a4720e5cea74e6fe99fd7cc1ee5bc084cbe8b55c79f24dc24f6050569b5b2c8f10f8afd52a00ca0308087ac6f2908612a6be89def65b2ecec3f2717a80e027bf58cb27d3cc41fa0d7b511420aa18706ba376ab3ed0a4317b2c1659a9f0bdaa46dc46ba3466f34c025a9d960e3e0c9e49dde05582abab6fc9abe257b16533dcf13a37697ea5dcd72f13b0817942cda097332df373af82424dfbd6ea5bf80df338b6e3995b8647a73ef285e1a976479d89df2857f7ea6c8c89d133232d82a54353261d8497c4a65791e2a9150e71b60c56ed0e33bc18c7651e6bbf06203b63ae180964cf92eded36dffba9a1ec3634473f816a1310c11b4286d005d8ba96400defe0c20c3c1e89c905118b3f74c5dcbd0a9e8819b5ae6764a8dc5b22d0f17ed2e5dc86233bd0fb06fe9ff4920ed2462e923aba3bdabea4239b02c399117ecb4641689f2487c8f5f96769dd9170537609cdf4b5183134c773bce831c95b83ca73e1ad2cfb252fe93d3d973c08c4794b777ca8e554adee2318199998fa329c1073fc7d9ed9f0a1dc453ff9d795553eea4c32a152c38a35ef48f609bf4521762cf0a0f7e3cd4fffad59da73ee98c7b982b6074d8dcc8a38f1645176a89cc6ee85a5ff580787857624aac0123539aa6e91afebf93ba954d3b1e500cbc2e1eb41f2f8afd51c72203f775c9cbb19d725f1ef5af09a2955483551e8bfec74503e4139fd7716c54745afa9028da6c457793132d9c5d8e85b324057dff4a277ce2b7e19f2dfd2c1f82b0b1a853b657c218e9bcc56be98fed7f0a23928125a22314dc937b4e"}) openat(r2, &(0x7f0000000240)='./file0\x00', 0x1, 0x85) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000100)=0x3) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000180)={'bridge_slave_1\x00', {0x2, 0x4e20, @loopback}}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f00000003c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x68, r3, 0x10, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0xa79, @link='syz0\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x40) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x48) 08:42:16 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r1, 0xffffffffffffffff, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:16 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:16 executing program 2: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:16 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x2) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r1, 0xffffffffffffffff, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1383.243023] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:16 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(0xffffffffffffffff, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:16 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:16 executing program 2: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "90a2e88495dafdfdfcc5e8eb197ae104"}, 0x11, 0x3) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000180)={0xb, 'syz0\x00', 'syz1\x00', 'syz0\x00', 0xea, 0x4, 0x5f, 0x9b, 0xfffffffffffffffd, 0x4, "ea8361022045fecd312232abb076dc05bc09b09326b4226356699950dc9268fcc3fecb4571defff39f688942793129df4212875e0cd98898563c9925e07c2337d7503ceef1cb6cad37cdf83efad9a2330d5ee46a269e6aeee4b82ea1362aa5f21bae108c15d4c24a8f28a3bcdc88021b281b55863a575cf23e52811d43384eb8fec80db35de1dc685eec3dcaf6ecd31b23c32e3b0d9e1da2e7495ffd35d701fe897f9c2adb7763fd18a70dfee067e10e26038e0fa7bac5cf239d450236881c5ddd91923cbfc0e67821067465ba59060baced61cd253160b68eca6ef2d2526d9daa6f2f5c06dfe665a373"}, 0x202) 08:42:16 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(0xffffffffffffffff, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1383.565325] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) dup3(r2, r2, 0x0) 08:42:17 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000001c0)={{0x7c, 0xfffffffffffffffe, 0x217, 0x5, 0x1000}, 0x7f, 0x1, 0xfffffffffffffffa, 0x0, 0x7fffffff, "6482ce81c66f457919dede1dcbfcce24a57d68adbb023568868dc8782475b27e3952f352c8e28e778bdf0e6ee624bbba41dc69b68cfd9ca7a420ef5ddbbc3e203c8e2382e8c96fe553a85823f5e0db87b6907c6f2035081243643f7586a8da397c4ca53040f1bf862a5718f785a98e06d95ed75dad7f9d28ea56f2a2a1270f3a"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(0xffffffffffffffff, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:17 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000080)={0x0, 0x4000, 0xffff, 0x80, 0x6}) dup3(r0, r1, 0x0) 08:42:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x400, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) r4 = getpid() lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, &(0x7f0000000c00)=0xc) r7 = gettid() r8 = geteuid() fstat(r0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000cc0)=0x0) utime(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)={0xff, 0x6}) getresuid(&(0x7f0000000d00)=0x0, &(0x7f0000000d40), &(0x7f0000000d80)) fstat(r0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000f40)=0xe8) r15 = getgid() sendmsg$netlink(r2, &(0x7f0000001100)={&(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbff, 0x80000000}, 0xc, &(0x7f0000000ac0)=[{&(0x7f0000000180)={0x60, 0x1e, 0xd10, 0x70bd2b, 0x25dfdbfc, "", [@generic="6107963b9add835b112c84287216ebfb1f98201c4fcd07277b2a5a056859ead57d94f42eb47794d12b9ae4bff7615d81e47cf15892a7e343cd6ece03e7aa0eac8067ec241a993821f8b188fcf1c5c3"]}, 0x60}, {&(0x7f0000000340)={0x77c, 0x23, 0x108, 0x70bd2b, 0x25dfdbff, "", [@generic="bde509f2b8cb25", @generic="8b5958f92c822da2a55ec6036ad884efce40ad1919e4c5d2a7e8988a0b717b698f5981c3a5fa17f977e0ba2eb4009cd4c8ce139dc474e32a28fd788577731baab956d8e896c804d1708972e84b3caef461a1e8a6bd1c17d48d31a9dee40937830b66da27dcf9caf3fca84e240afc87faecd9458e404a5b6747c8685307d249a9a767e874165d0d2fd74816c18a0670d4d9749f9c830c808dda2a83a77dfb032bdfcb7448da1a79f8535cb224144588ca5b0a1b7c612650e623454708a0a0c9a7f4843606e048c22bf7bfd5366b9102b2ef808a7f5a8b8da3dcb2", @generic="cb0e7824cf6df75e2832b7c5a6d51c43b32f0b31d244a9d68792bbfcdd98e5a250944a3aebf1f99629c0eb863f1d5dbe40eb2d66a02d1b44bbabd05f81e7c81e93f4da760898090c583646efea20e643093a891ced3a5e2b03e755c36ecd8e4ad7c4cb10d56c3040acbd43285ed57a8301f2b7d595ce3ce6af6f11d050f054f771403c03095bae75e0ba5dd6c4b9c63bc2", @nested={0x1e4, 0x29, [@generic='T', @generic="e9c7120aa644cf15ca5a191bd5f0b2417905ad47ced9b9d06a823de3a1c82bb2bafa6648feeeecb022493904694d80e1c8e2f2cada977efdf94c7d6eeab7426abc5997bc7868e3bc89a2c13e3a7405f449f660c2f160a53b0b11991e7bebdf90d001518821baf46810ffeddfd74a03e1fa7443688d14adf63ade41d13022ac0c19e0af6638d88bfe278c27777ca599b1f1cc1f68e35128d0a32e54adeb61a5ebfadae60819405e55e4f1573370c50f58b76ee5cf6aff2bf8fda0e9f6fcc4124d1b0259168a23eec1c91306dd11c3b0a7881e9f7db238fd91c635e029fab7a0db7d102e8ffabe14521570", @generic="2c7b610f7cb02375923bb261466e4ec537b72b2b23418dccbbb7f6771f13e5b555cd8cb2b7dab0cf1a28fa3dc8d39e93480c5cfbcfde96dd97dd8a40f3f5252ede761f145be30d051b06c03e53f317e8738504ec2ebc1aa6d46171", @generic="a278e63e3c56959e25fdc3c44b03520b14450dbeae9bb1ded4d84e6ed51253275ba9825bb46945a0ed0b2d3b82423a83955cd24e2fc1c5e88c42a78da649969165e676aa766824fc2cc85f2871216cd430181d6e41a6750226492b1454c862048a197d6457db7a646662a5cd023197457ac43bd4887d87dbdd2d9332e3bea4760639aff31e7fed4603ed12b6a9bea7abec7f6157fae2740f9813"]}, @generic="1805533ee73ba3ce411e3d49d3b66ae5b196585e72ee2055d71814ba2fcec981a24c675592cf724148185ea0b9d0a30cbae6eda12f8d19989c87230bf07bd76b229b9d4d22943ac332919e1a7d8d07ef5b91e4491ca01eb3231db79182e5d56497020db953aa0e4fc4b7567db9a4d4a0cab0a2eed22fd1270368a0446accd88ea61c6ee005f84e38b449f8acae911ed8585037c823d43416afd08d9fdcf7dd5dcc7b3eede3ddb31611b490c223c1a586f2c7047c1c28e066cf00e17594ac1bb214e3aa0fa51e11b8370637f487ef661f6562817f75f90d35592c028621570dde011f761cc5c81dcefc", @nested={0x178, 0x7, [@typed={0x8, 0x83, @ipv4=@loopback}, @typed={0x8, 0x6e, @uid=r3}, @typed={0x8, 0xa, @fd=r1}, @generic="e77fba5bc7c6228c426419a41c8d43a22ee8c4a7926d1fc1c4fe65e035a2b73b05d543ee0c9ea003c59804c270b8d3602099d892e01c5ff1e53f7698022e2fd3402d23be9836ab0651d3f00ad6397205452339719a4bbfdd9558449fbb83dfde196f5f92c7165779bb012911554a0892e0d6448b1c5ecc4e7666a69af3497192dd92bae2b81bb1bf93276068e1a045cece37978533a0288c6a7d625b6436fc6e25de3859f71e051ff8f01c64ccad6915db1042f5c578738cbd2a02d1ad", @typed={0x14, 0x51, @ipv6=@remote}, @typed={0x8, 0x3a, @ipv4=@multicast1}, @generic="d40354655c1cd35c2530fb5b1dde04ea33490a163745005bb9bfca28271dfe9074fe1cf7cdbc04e502170d8e89fc58343ce51c848e04f80bc45f9f9a1513ec3e856b98927b140dc39c7b8aa51bfb7a515014cbad4460bddb1716c6d318b13cd725a4f441add3a791b1d711a9f44f437791b3b850582e97eeda46448e70fbed3f3b"]}, @nested={0x1b4, 0x86, [@typed={0x8, 0x55, @str='tls\x00'}, @generic="5d38570b03e909ea36fde9b1f4c6dd9564d587dba6ac5d644b7b77f0b0989307c54d16662823607890474f1dbf78e6d16eb7a5589b4c88db6b26fd50cb7b3cac3483689f9cb390ab11e89d3b7300fde86b9c81f662c289a260ce1dc9ab55e1fe37e75d48079af50591baa6cb577398b0a32a089225a871f3b605739b08d08284fd3a2c251170f0c9f9b7ff16f419bb5557b892c0f7beb016831ef6d77f9c6dc6ca393e2e1a93afe10a36355c5c38495621c708854e088bf09d590085e13fbb61d01ac2cbcf0981940c58873633f33f5d7306a219f4b8bd555dd7ef915832e13afa4539dafd69", @generic="924e9b7c8074db766fb2982dc448ccc3b362c7c5777588bff090c080b96aa6864a9d16f6abe3a51bffef9311d92df7f7d59eed778ccaa0051ca8e7fb3f85f04467db69d5f00e2b0af37deaa755471e11c6f2556f9269f1a7a829", @typed={0x4, 0x6e}, @generic="46b80c122272273f16f675290f3db5a413d6390615bebf9a6b3f11fc7cf28059ef259a54d8bdac6b665e7ed30091436fd6605c3ff626562d00068533dee934369b4bf0a949c018bd1f0ee4361f220422a89b0700a5dbfc918395a99e3e7441b33948"]}]}, 0x77c}], 0x2, &(0x7f0000000f80)=[@cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}, @cred={{0x1c, 0x1, 0x2, {r7, r8, r9}}}, @rights={{0x30, 0x1, 0x1, [r0, r1, r1, r1, r1, r1, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, r12}}}, @cred={{0x1c, 0x1, 0x2, {r13, r14, r15}}}, @rights={{0x18, 0x1, 0x1, [r1, r1]}}, @rights={{0x30, 0x1, 0x1, [r1, r1, r0, r1, r1, r0, r1, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x1c, 0x1, 0x1, [r1, r0, r1]}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x148, 0x40}, 0x40040) dup3(r0, r1, 0x0) 08:42:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000180)={0xb, 'syz0\x00', 'syz1\x00', 'syz0\x00', 0xea, 0x4, 0x5f, 0x9b, 0xfffffffffffffffd, 0x4, "ea8361022045fecd312232abb076dc05bc09b09326b4226356699950dc9268fcc3fecb4571defff39f688942793129df4212875e0cd98898563c9925e07c2337d7503ceef1cb6cad37cdf83efad9a2330d5ee46a269e6aeee4b82ea1362aa5f21bae108c15d4c24a8f28a3bcdc88021b281b55863a575cf23e52811d43384eb8fec80db35de1dc685eec3dcaf6ecd31b23c32e3b0d9e1da2e7495ffd35d701fe897f9c2adb7763fd18a70dfee067e10e26038e0fa7bac5cf239d450236881c5ddd91923cbfc0e67821067465ba59060baced61cd253160b68eca6ef2d2526d9daa6f2f5c06dfe665a373"}, 0x202) [ 1384.149582] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1384.163406] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:17 executing program 3: creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1384.199752] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:17 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:17 executing program 2: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:17 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0xe) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1384.534827] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x400, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) r4 = getpid() lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, &(0x7f0000000c00)=0xc) r7 = gettid() r8 = geteuid() fstat(r0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000cc0)=0x0) utime(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)={0xff, 0x6}) getresuid(&(0x7f0000000d00)=0x0, &(0x7f0000000d40), &(0x7f0000000d80)) fstat(r0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000f40)=0xe8) r15 = getgid() sendmsg$netlink(r2, &(0x7f0000001100)={&(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbff, 0x80000000}, 0xc, &(0x7f0000000ac0)=[{&(0x7f0000000180)={0x60, 0x1e, 0xd10, 0x70bd2b, 0x25dfdbfc, "", [@generic="6107963b9add835b112c84287216ebfb1f98201c4fcd07277b2a5a056859ead57d94f42eb47794d12b9ae4bff7615d81e47cf15892a7e343cd6ece03e7aa0eac8067ec241a993821f8b188fcf1c5c3"]}, 0x60}, {&(0x7f0000000340)={0x77c, 0x23, 0x108, 0x70bd2b, 0x25dfdbff, "", [@generic="bde509f2b8cb25", @generic="8b5958f92c822da2a55ec6036ad884efce40ad1919e4c5d2a7e8988a0b717b698f5981c3a5fa17f977e0ba2eb4009cd4c8ce139dc474e32a28fd788577731baab956d8e896c804d1708972e84b3caef461a1e8a6bd1c17d48d31a9dee40937830b66da27dcf9caf3fca84e240afc87faecd9458e404a5b6747c8685307d249a9a767e874165d0d2fd74816c18a0670d4d9749f9c830c808dda2a83a77dfb032bdfcb7448da1a79f8535cb224144588ca5b0a1b7c612650e623454708a0a0c9a7f4843606e048c22bf7bfd5366b9102b2ef808a7f5a8b8da3dcb2", @generic="cb0e7824cf6df75e2832b7c5a6d51c43b32f0b31d244a9d68792bbfcdd98e5a250944a3aebf1f99629c0eb863f1d5dbe40eb2d66a02d1b44bbabd05f81e7c81e93f4da760898090c583646efea20e643093a891ced3a5e2b03e755c36ecd8e4ad7c4cb10d56c3040acbd43285ed57a8301f2b7d595ce3ce6af6f11d050f054f771403c03095bae75e0ba5dd6c4b9c63bc2", @nested={0x1e4, 0x29, [@generic='T', @generic="e9c7120aa644cf15ca5a191bd5f0b2417905ad47ced9b9d06a823de3a1c82bb2bafa6648feeeecb022493904694d80e1c8e2f2cada977efdf94c7d6eeab7426abc5997bc7868e3bc89a2c13e3a7405f449f660c2f160a53b0b11991e7bebdf90d001518821baf46810ffeddfd74a03e1fa7443688d14adf63ade41d13022ac0c19e0af6638d88bfe278c27777ca599b1f1cc1f68e35128d0a32e54adeb61a5ebfadae60819405e55e4f1573370c50f58b76ee5cf6aff2bf8fda0e9f6fcc4124d1b0259168a23eec1c91306dd11c3b0a7881e9f7db238fd91c635e029fab7a0db7d102e8ffabe14521570", @generic="2c7b610f7cb02375923bb261466e4ec537b72b2b23418dccbbb7f6771f13e5b555cd8cb2b7dab0cf1a28fa3dc8d39e93480c5cfbcfde96dd97dd8a40f3f5252ede761f145be30d051b06c03e53f317e8738504ec2ebc1aa6d46171", @generic="a278e63e3c56959e25fdc3c44b03520b14450dbeae9bb1ded4d84e6ed51253275ba9825bb46945a0ed0b2d3b82423a83955cd24e2fc1c5e88c42a78da649969165e676aa766824fc2cc85f2871216cd430181d6e41a6750226492b1454c862048a197d6457db7a646662a5cd023197457ac43bd4887d87dbdd2d9332e3bea4760639aff31e7fed4603ed12b6a9bea7abec7f6157fae2740f9813"]}, @generic="1805533ee73ba3ce411e3d49d3b66ae5b196585e72ee2055d71814ba2fcec981a24c675592cf724148185ea0b9d0a30cbae6eda12f8d19989c87230bf07bd76b229b9d4d22943ac332919e1a7d8d07ef5b91e4491ca01eb3231db79182e5d56497020db953aa0e4fc4b7567db9a4d4a0cab0a2eed22fd1270368a0446accd88ea61c6ee005f84e38b449f8acae911ed8585037c823d43416afd08d9fdcf7dd5dcc7b3eede3ddb31611b490c223c1a586f2c7047c1c28e066cf00e17594ac1bb214e3aa0fa51e11b8370637f487ef661f6562817f75f90d35592c028621570dde011f761cc5c81dcefc", @nested={0x178, 0x7, [@typed={0x8, 0x83, @ipv4=@loopback}, @typed={0x8, 0x6e, @uid=r3}, @typed={0x8, 0xa, @fd=r1}, @generic="e77fba5bc7c6228c426419a41c8d43a22ee8c4a7926d1fc1c4fe65e035a2b73b05d543ee0c9ea003c59804c270b8d3602099d892e01c5ff1e53f7698022e2fd3402d23be9836ab0651d3f00ad6397205452339719a4bbfdd9558449fbb83dfde196f5f92c7165779bb012911554a0892e0d6448b1c5ecc4e7666a69af3497192dd92bae2b81bb1bf93276068e1a045cece37978533a0288c6a7d625b6436fc6e25de3859f71e051ff8f01c64ccad6915db1042f5c578738cbd2a02d1ad", @typed={0x14, 0x51, @ipv6=@remote}, @typed={0x8, 0x3a, @ipv4=@multicast1}, @generic="d40354655c1cd35c2530fb5b1dde04ea33490a163745005bb9bfca28271dfe9074fe1cf7cdbc04e502170d8e89fc58343ce51c848e04f80bc45f9f9a1513ec3e856b98927b140dc39c7b8aa51bfb7a515014cbad4460bddb1716c6d318b13cd725a4f441add3a791b1d711a9f44f437791b3b850582e97eeda46448e70fbed3f3b"]}, @nested={0x1b4, 0x86, [@typed={0x8, 0x55, @str='tls\x00'}, @generic="5d38570b03e909ea36fde9b1f4c6dd9564d587dba6ac5d644b7b77f0b0989307c54d16662823607890474f1dbf78e6d16eb7a5589b4c88db6b26fd50cb7b3cac3483689f9cb390ab11e89d3b7300fde86b9c81f662c289a260ce1dc9ab55e1fe37e75d48079af50591baa6cb577398b0a32a089225a871f3b605739b08d08284fd3a2c251170f0c9f9b7ff16f419bb5557b892c0f7beb016831ef6d77f9c6dc6ca393e2e1a93afe10a36355c5c38495621c708854e088bf09d590085e13fbb61d01ac2cbcf0981940c58873633f33f5d7306a219f4b8bd555dd7ef915832e13afa4539dafd69", @generic="924e9b7c8074db766fb2982dc448ccc3b362c7c5777588bff090c080b96aa6864a9d16f6abe3a51bffef9311d92df7f7d59eed778ccaa0051ca8e7fb3f85f04467db69d5f00e2b0af37deaa755471e11c6f2556f9269f1a7a829", @typed={0x4, 0x6e}, @generic="46b80c122272273f16f675290f3db5a413d6390615bebf9a6b3f11fc7cf28059ef259a54d8bdac6b665e7ed30091436fd6605c3ff626562d00068533dee934369b4bf0a949c018bd1f0ee4361f220422a89b0700a5dbfc918395a99e3e7441b33948"]}]}, 0x77c}], 0x2, &(0x7f0000000f80)=[@cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}, @cred={{0x1c, 0x1, 0x2, {r7, r8, r9}}}, @rights={{0x30, 0x1, 0x1, [r0, r1, r1, r1, r1, r1, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, r12}}}, @cred={{0x1c, 0x1, 0x2, {r13, r14, r15}}}, @rights={{0x18, 0x1, 0x1, [r1, r1]}}, @rights={{0x30, 0x1, 0x1, [r1, r1, r0, r1, r1, r0, r1, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x1c, 0x1, 0x1, [r1, r0, r1]}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x148, 0x40}, 0x40040) dup3(r0, r1, 0x0) 08:42:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x49, 0x8000) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000100)={{0x2, 0x7, 0x3ff, 0xffffffffffffc5af, 0x7, 0x2}, 0x81}) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000080)=""/19, 0x13) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:18 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000180)={0x1, 0x0, [], {0x0, @bt={0xc9, 0x1ff, 0x0, 0x1, 0x0, 0x1, 0x9, 0x140000000000000, 0x6, 0x1, 0x7ff, 0x80000001, 0x6, 0x45, 0x6, 0x11}}}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$sock_netdev_private(r1, 0x89fc, &(0x7f0000000100)="c090f74bedbd2af2") getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0xa6, "33efc01e5abe33758e0bce003915a25b9c0d263b23e730c03c800e925c03977fa7234c0a6e237fe741bfaed1c50f5e5ab76a92f124c516e95ab57197142d099516cd7c6685c1e414e8c0140e7c26dbf3bdce8679b3bb433aac14e1df3e3d51251c0453d43e5dbaed1ebf4950bfa77410aa8dab8c8b4524e2b96b9f853c13fe22b546f38fd75aa524ab126239bd4835f8eae1e23acaa8e2ad6202ff8d1c3b1f991fc4988cdf61"}, &(0x7f0000000300)=0xae) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000380)={r3, 0x2c, &(0x7f0000000340)=[@in6={0xa, 0x4e23, 0x8000, @dev={0xfe, 0x80, [], 0x1a}, 0xffff}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f00000003c0)=0x10) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:18 executing program 0: listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r0, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1385.057820] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1385.092111] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:18 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r0, &(0x7f00000001c0), 0x0) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f0000000040)=""/8, &(0x7f0000000300)=0xfffffffffffffec4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x54030500, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x4e24, 0x3, @rand_addr="1e543fec58b9a659948e2f2206c7eac5"}, 0x7a4339ac4efb63b8) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r4, 0x1, 0x4, &(0x7f00000003c0)=0x368, 0xfffffffffffffed2) bind$inet6(r5, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 08:42:18 executing program 0: listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r0, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 08:42:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "5ffbd397749f2024", "4b0503cbc6afa58fdd939e72c9a5e7ec", "95a35f52", "280b6daeffde135b"}, 0xffffffe7) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1, 0x80) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=0x0, &(0x7f0000000180)=0x4) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000001c0)={r3, 0x1d, 0x2, [0x1, 0xfffffffffffffff9]}, 0xc) dup3(r0, r1, 0x0) [ 1385.328829] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1385.341808] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:18 executing program 0: listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r0, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) [ 1385.410759] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1385.432305] net_ratelimit: 24 callbacks suppressed [ 1385.432311] protocol 88fb is buggy, dev hsr_slave_0 [ 1385.442591] protocol 88fb is buggy, dev hsr_slave_1 08:42:18 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000480)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) syz_open_dev$swradio(&(0x7f00000003c0)='/dev/swradio#\x00', 0x0, 0x2) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 1385.474517] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1385.910154] protocol 88fb is buggy, dev hsr_slave_0 [ 1385.915267] protocol 88fb is buggy, dev hsr_slave_1 08:42:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x9, 0x101080) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) r5 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000500)=0xe8) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0xc0000, &(0x7f0000000540)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x100000001}}, {@allow_other='allow_other'}], [{@euid_gt={'euid>', r5}}, {@obj_user={'obj_user'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '{'}}, {@uid_eq={'uid', 0x3d, r6}}]}}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:19 executing program 1: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r0, 0x0, 0x0, 0x80000) write(r2, &(0x7f0000001a40)="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", 0x201) read(r1, &(0x7f0000000200)=""/250, 0xfa) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r5 = socket$packet(0x11, 0xffffffffffbffffd, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000500)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r5, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000005c0)='./file0\x00', 0x2) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r4, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r4, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r4, 0x1) 08:42:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x4002, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0x4, 0x8200, 0xe82, 0x7fff, 0x0}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000200)={r3, 0x87}, &(0x7f0000000240)=0x8) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@gcm_128={{0x307}, "051523a071e5838c", "e4773691b6147c81cd7ead1219b88613", "c7433af3", "8412d50ed56cc1b1"}, 0xffffffffffffff7d) 08:42:19 executing program 0: listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r0, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:19 executing program 2: listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r0, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1386.076730] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:19 executing program 0: listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r0, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:19 executing program 2: listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r0, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1386.230142] protocol 88fb is buggy, dev hsr_slave_0 [ 1386.235482] protocol 88fb is buggy, dev hsr_slave_1 [ 1386.240670] protocol 88fb is buggy, dev hsr_slave_0 [ 1386.245751] protocol 88fb is buggy, dev hsr_slave_1 08:42:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) fcntl$addseals(r0, 0x409, 0xa) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x2) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1386.310147] protocol 88fb is buggy, dev hsr_slave_0 [ 1386.315352] protocol 88fb is buggy, dev hsr_slave_1 08:42:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:19 executing program 0: listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r0, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:19 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet(0x2, 0x4000000020000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r5 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r5, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$inet(r2, &(0x7f0000000f40)=[{{&(0x7f0000000b00)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000480)="4bc8bc6f4af38f1d283a0bea4cd9c188e1ded1d0677b56ebac82dd550b5c0b70d92adf2d6bf3c5c23618279569d76b04bb3fb36c27182f45315d16efe39dc9076feaf4425ffae9052fb8e0a58df8c63729d52264d862f92e2bfca7de0d24e85d1442fb5b22072cce9f3d4ee9731f0e6347feb8734c926b297049d58a395a99e42c8ec433180bec45325e63e3e57ea423a01594bc33ff70843d4148685f4ca026b2130fdb1ce223db243e2c3892f05fc4311cb8a8c82bc69626", 0xb9}, {&(0x7f0000000540)="5ae5693206f9646fccc346f4f9cec8a9942519afe9d9cb4953478524ad903116b0d68776687dc1a03a397eefc63efcae9ba5c9ce9d2650ad1f8c515b29b49e2c504c9c1bb1fbdc5a362f5110a3e8402a4781fdc0b8d9718d199543033f4cab31e1b6c7945bd0347f5faf7276dba7978b6e02b8dc3fce43a924db9da909bdadb31d2aa748a2dae6c87c12530dd61f041a3b5e46786793a25a8a2b16cffe2399639d3425fbb89ee0dd8316115e99b9c89f037c9bc87450b51ecaa4bb757bd750268f987c5d0526a233c2a9966cd02f07e46aa76422cc3a2430c2e0cab7d1837dd6fdd3f237a0e4a0eb36", 0xe9}, {&(0x7f0000000640)="2b68523be293ee4b78d703d5a52c9435579c866131bf4f2a02dc8c4bbd76671d8a09101780d4ae8e5ca8622460c66c469bd69738a3ce8a0dc0088a45faf11dbe02f0871fbfbeac48aed926210af630ae730cf0d98d49f889bcbea1c85614398c90219688aaca56a590446fdf2ae63f", 0x6f}], 0x3}}, {{&(0x7f00000006c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000800)="1f20b74d0861e8f1a6091b5453e03e7793d6da6582e5ebc38e7597e046c886c9de59ea333ad3129a552981191891402403ec4d19483e09090ee63c5ebc06da8a6e4758d901bde0760fd3fc0eec74f3537e20129067f28da26dbafdfa9d389cb892c94cf2eec7cae61feb8234aed30cc17c842aace5f96fb2290acec30b1b0cc348794e300d876cd2475f5fcbf1038d733325dcd2fb3473a685f98140229629bb4fd8de299fd8665f934a7119b8db1c20db7b304d0c9fa4ffb97cb647f12b2354c4bd446b765b004a58e76b60e45f5bbdb442032ed155eca04583c9ec0d29a5756769f41d", 0xe4}, {&(0x7f0000000700)="0f0bf16e14fc5c9ff5b33ba370da390432edc36e5693b767d43def8f0e32ce3dc9791637200d8fac11845a59353ccf9fe59f41aee522f1068e25b3632bc1ab9989efdec133fbf7c4632314883c43debc53c49dab7fdad06bb1b11d82901d878bb53bef9c03f218d60f09cef6cb50dc6578027dd6b4eb2c4236fca3fbaf3971af3a568ae4a54240", 0x87}, {&(0x7f0000000900)="0fdc9fffc5e6ce015a49c8ac1667af1c06af417be31d0815c73ff4bfc3b9eca0cb8f5f8ea64134724bdcfa9365544292fdca9747760cc4cc1491fe9d28bcccef1282749670086d44fdf1d53c851541509e5bfa04dd2322d5b750a87e9210c340fa9da0daa1c452853b7a5aab5d375f925a6f986429f1730276421917100531c124", 0x81}, {&(0x7f00000009c0)="346998268cc51ca25805011a140210b6760f9c6a9191f96453c0f21938e1adcc35bec4e838d4e468bb69d2338f508ae4b0db90be2c8ba66edfaf", 0x3a}, {&(0x7f0000000a00)="c79cb851cc30129aa818d88c3c34424efbc872ad22ea9c0281790ee4c507f9392ba23eb5e9f016d486c33343fcf62fc01bff2d38ce0b821dd1299429a4d60dd6097d9524343db0ed6b2b6ec809f0dc6c421673125f3cf78273625aec3b6a9c6920f78084ec2bef5225fbfb9a4d2834f9a5901d6f1d50086e5ac96f86", 0x7c}, {&(0x7f0000000a80)="a48d3289d419797fca0f2f363ae14f963b04713b60562758c631a0a9484791c67b4a40f474904c2ca47a5bc48b55583c8f2baa2747740bb2e5066c5d39d16a856f2c6accd8d0776c84b665b041cb550a9f4e7f33a094fde297a57ef8bf79e17c4a610e", 0x63}, {&(0x7f0000000b00)}, {&(0x7f0000000b40)="d8822587a884af5ea35708cc7f17ac5398b943c4781e1536bd22e0d051211488", 0x7}], 0x8}}, {{&(0x7f0000000c00)={0x2, 0x4e20, @multicast1}, 0xfffffffffffffc8e, &(0x7f0000000f00)=[{&(0x7f0000000c40)="a5757782f06fe6bed50176df10ad0a58153175b803f788475e707c7f62074df59353df54805089f658cecd1d6d4d3102f41a9bb8c98a7002ca292fae241c72206723322b2d0565a886f42f6524daa2024e33c69dec871efa3e7e0b39281b8b561813d2a957f72bc4f56d82e81fcdde2345f5b1bdb5765e54c7a3390f6f04646f526f48bd625e72db0436222e5781a28fddb710f7639875bcc624117da6136b983a1f7e78f524cceeb951697ce756", 0xae}, {&(0x7f0000000d00)="d2b27b63684f0674e1d89c9d8cfe82548d6c0dbb678c14e4ef3c0dd8fad46de1030d01c980d84566ecd37d4b8069c95714354be97f4dfe7ef9cc1f055226ad44177a240b7884ce224cd244539757a130a8d645163bf0a7d3a665d78764e79d51fe7a789c0472f6754b10124aa13e04bd69f167d23bd83614932e41679bdc315d4fbcb2870fa114da09aa5ddc9ad8d771d3ca431045520dba1cf5", 0xfffffffffffffe9a}, {&(0x7f0000000dc0)="c48af8f35f666e7b002d1a33171902265b1c1032f9ce9726b3c138f468fc50fca14f895b0fc8d818132bf22e3b8e6b3d9f08b86e9988ca8c80dceaebd877bf5d6f8fdd1a78389acfa1894e17965f26daf505eacaf27b94cdb86c3c4a113d6cf8396794d46da6aceeca5d0b296eb98455b1584e208b85df08f6829048fa521b679c2db88e6fbca3f66cfe50454663659f2c75162a4b9fc745cb1939da7c1faaeffac58ee2698d8878aaf726c56dd8d1ea59930b7de8e5a97aa5ef9bfa1c49", 0xbe}, {&(0x7f0000000e80)="bc5171742b50b68a70db743a63ba1f0a659510775bf5e76681a6d0c1d92b6b7ac1294411761730de2f3ee11345edba34967522c7dbc7becdc3f4ab5acb7265b371a88528e1545cdfc409fa7ece82", 0x4e}], 0x4}}], 0x3, 0xc000) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r5, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r7, &(0x7f0000000040), 0x8) listen(r7, 0x0) poll(&(0x7f0000000080)=[{r7}], 0x2000000000000067, 0x0) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r4, 0x0, 0x0, 0x20000802, &(0x7f00000003c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) [ 1386.448263] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$VIDIOC_S_EDID(r2, 0xc0285629, &(0x7f0000000180)={0x0, 0x248, 0x8, [], &(0x7f0000000100)=0x9}) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) open$dir(&(0x7f0000000280)='./file0\x00', 0x1, 0x50) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xfe08) recvmmsg(r3, &(0x7f00000086c0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000042c0)=""/40, 0x200042c8}, {&(0x7f0000004480)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240)) recvmmsg(r4, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) r5 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_STAT(r5, 0xd, &(0x7f00000000c0)=""/228) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x400000, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r6, 0x6, 0x21, &(0x7f00000001c0)="89141531d3a5e9cf06ab52c688f6005a", 0x10) dup3(r0, r1, 0x0) 08:42:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) open$dir(&(0x7f0000000280)='./file0\x00', 0x1, 0x50) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xfe08) recvmmsg(r3, &(0x7f00000086c0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000042c0)=""/40, 0x200042c8}, {&(0x7f0000004480)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240)) recvmmsg(r4, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) r5 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_STAT(r5, 0xd, &(0x7f00000000c0)=""/228) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x400000, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r6, 0x6, 0x21, &(0x7f00000001c0)="89141531d3a5e9cf06ab52c688f6005a", 0x10) dup3(r0, r1, 0x0) 08:42:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1386.966972] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1386.970090] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:20 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r0, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0xffff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8001}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = getpgid(0x0) waitid(0x1, r2, &(0x7f0000000180), 0x2100000a, &(0x7f0000000200)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r0, r1, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r3, 0x400442c9, &(0x7f0000000100)={0x3}) 08:42:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:21 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r0, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:21 executing program 2: listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r0, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:21 executing program 1: listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r0, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000100)={0x4, &(0x7f0000000080)=[{}, {}, {}, {}]}) 08:42:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1387.915472] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)={0xd4a}) connect$netlink(r2, &(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbfb, 0x100001d}, 0xc) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:21 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r0, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0xffff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8001}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = getpgid(0x0) waitid(0x1, r2, &(0x7f0000000180), 0x2100000a, &(0x7f0000000200)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r0, r1, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r3, 0x400442c9, &(0x7f0000000100)={0x3}) 08:42:21 executing program 1: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000003c0)={'ipvs\x00'}, &(0x7f0000000540)=0x1e) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) write$sndseq(r2, &(0x7f0000000480)=[{0x4, 0xc1, 0x5, 0x4, @tick=0x8, {0x10001, 0x8}, {0x1, 0x2a}, @queue={0xfff, {0x100, 0x200}}}, {0x31, 0xffffffffffffffdf, 0xe444, 0x2, @tick=0x1, {0x8, 0x400}, {0x3}, @quote={{0x1, 0x3ff}, 0x7f, &(0x7f0000000300)={0x5, 0x0, 0x7fff, 0x8, @tick=0x8, {0x0, 0x9}, {0xfe2, 0x8000}, @addr={0xae4d, 0xb2b}}}}, {0x8, 0x10001, 0x671a, 0x7fff, @time, {0xff, 0x4}, {0x2, 0x200}, @queue={0xff00, {0xf25, 0x40}}}], 0x90) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 08:42:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0xffff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8001}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = getpgid(0x0) waitid(0x1, r2, &(0x7f0000000180), 0x2100000a, &(0x7f0000000200)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r0, r1, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r3, 0x400442c9, &(0x7f0000000100)={0x3}) 08:42:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 08:42:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:21 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r0, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1388.300487] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004000, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x6, 0x141041) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup(r0) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000180)=0x60, 0x2) r3 = dup3(r0, r1, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000100)=0x8) syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x8, 0x0) 08:42:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:22 executing program 5: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r1, 0x0, 0x0, 0x1000000080000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 08:42:22 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r1, 0x0, 0x0, 0x1000000080000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 08:42:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-224-generic,cbc-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8e7ea6c1", 0x4) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:etc_t:s0\x00', 0x1b, 0x2) 08:42:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:22 executing program 1: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) epoll_create(0x7) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x12, &(0x7f0000000300)=0x8000004, 0xffffff5c) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000000540)="6c0f6d615cc0e47eafde246d546593b67ae643a0eab7fff1eaaf244f2891b451aa2c39e1b0bb88c6eedab2f751d3fc890ff5b6198c8a8d685437c1dccbc5302f9b59ff03e18ee8daf693b11a5ac6b155539e89c560b79689098ec695f358096be2b9895d7219f0caef7eb32ee5b2c7a6e326167659eb", 0xfffffffffffffecc, 0x8000000000003, 0x0, 0xffffffffffffff37) shutdown(r3, 0x1) [ 1388.994448] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:22 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r0, 0x0, 0x49, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 08:42:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x304}, "efe50862007d8abd", "d9a57993576c9a63046ebb5216d1d169", "cf0cc7cd", "d62f454e9b83ff30"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) r4 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) bind$alg(r0, &(0x7f000001f000)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-224-generic,cbc-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8e7ea6c1", 0x4) 08:42:23 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xffffffffffffffff, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) sendto$inet(r3, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x379) shutdown(r3, 0x1) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getegid() lchown(&(0x7f00000003c0)='./file0\x00', r6, r7) 08:42:23 executing program 5: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000500), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 08:42:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) ioctl$VIDIOC_DECODER_CMD(r2, 0xc0485660, &(0x7f0000000180)={0x2, 0x3, @stop_pts=0x1}) 08:42:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1390.448605] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1390.470455] net_ratelimit: 26 callbacks suppressed [ 1390.470466] protocol 88fb is buggy, dev hsr_slave_0 [ 1390.481534] protocol 88fb is buggy, dev hsr_slave_1 [ 1390.790148] protocol 88fb is buggy, dev hsr_slave_0 [ 1390.795285] protocol 88fb is buggy, dev hsr_slave_1 08:42:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000080)=0x80, 0x4) dup3(r0, r1, 0x0) 08:42:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:24 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ashmem\x00', 0x2200, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x337e) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 08:42:24 executing program 1: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f0000000240)="8877a96777929433412e8f8b2ebcdebac5e79903126a20fe18b98d9590bd124ded040e113eeb98ecc7f25be98bc7a6dfc191c248d19b3779316e07f8c4ec922c87f02fe0b2fd1bd9f10dbab55ccc7e4ad976806680452027c0218141c2a3f4439a97c0d6018729b4ea698fc074d4cf2cb41999fa85333517ebaa5820f2b4caa41974b9c2ecacd020a1d8da81649c328537f240b2ef25c898348b7d3fa1704596e75fb893280c498cd9", 0xc6) read(r1, &(0x7f0000000480)=""/250, 0xfffffdf1) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x3ffffffffffffffe, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0xfffffffffffffee0) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0xfffffffffffffffc, @dev={0xfe, 0x80, [], 0x1c}, 0x8}, 0xffffffffffffffcc) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x8000004, &(0x7f0000000300)=0x8000008, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000580)='./file0/file0\x00', 0x4000000200, 0x0) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 08:42:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:24 executing program 5: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() fcntl$setsig(r4, 0xa, 0x21) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 08:42:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1391.202678] protocol 88fb is buggy, dev hsr_slave_0 [ 1391.208242] protocol 88fb is buggy, dev hsr_slave_1 [ 1391.221467] device bridge_slave_1 left promiscuous mode [ 1391.227007] bridge0: port 2(bridge_slave_1) entered disabled state 08:42:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1391.342175] device bridge_slave_0 left promiscuous mode [ 1391.370453] bridge0: port 1(bridge_slave_0) entered disabled state [ 1391.651977] device hsr_slave_1 left promiscuous mode [ 1391.694860] device hsr_slave_0 left promiscuous mode 08:42:25 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f0000000100), 0x0, 0x800, 0x0, 0xfffffffffffffee5) dup3(r1, r2, 0x0) 08:42:25 executing program 5: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000003, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000003c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) r6 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r6, 0x29, 0x16, &(0x7f000034c000), 0x4) setsockopt$inet6_int(r6, 0x29, 0x16, &(0x7f0000fcb000), 0x4) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) 08:42:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in=@local, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@initdev}}, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @empty}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200000, 0x15a) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000200)="664a293b529c9cb85b3efa80b24807a35da4a7da0280c446dcf30719836b3ad04ec90b05f39603ab2cd2bbdb46fd2cf37882db95385854c7e252bc20ac328e04464abb8f031e9aa0a1ae8904735d6dacf3", 0x51}, {&(0x7f0000000280)="6d3669452d45c0690f74cec7184a5a8967db8f3615cd2fd798f1a2ce8077628021074600bcd38bc663c07237d55eca7306015dab8c53d0bb0b8a9ba4882fb8454659f4dc64964835b181ca35defd7679cf8fa879e2aae0ebadd6053969cf1bcb5761e0822ef87928df88963a5fde6082223a358b38fb62083e819678e2d5fa1b1895c9cfeb4fddcdfab416e935d0c7fc7f47", 0x92}, {&(0x7f0000000380)="5de3571f6b4e7518bfc1644b0472c40b03c1da05ac6241e53ac0244e322b26a976e27dc4b844431bd1e57a409a19ec7aa78f6dc2803b16816e1bd33d429517039dc5fb0857e82840f31cc24d22a88f0b70b1ed48234d52e05a5741e0b0d7daeb62fdddc287db46996667dd8df56666bf5c0d1af4f079a223a86d3d177be529e3705a6e2288579efa186d477b553689838c507fdb13105ae61572", 0x9a}], 0x3) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f00000000c0)={0x17, 0x6, &(0x7f0000000080)="d972ca87858b"}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x40) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$alg(r0, &(0x7f000001f000)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-224-generic,cbc-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8e7ea6c1", 0x4) socket$alg(0x26, 0x5, 0x0) 08:42:25 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000200, 0x102, 0x2, 0x7, 0x722b, 0x4, 0x1293, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x61f, 0x6}) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000200)={'veth0_to_bond\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_newaddr={0x40, 0x14, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r7}, [@IFA_CACHEINFO={0x14}, @IFA_LOCAL={0x14, 0x2, @local}]}, 0x40}}, 0x0) 08:42:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1391.755082] team0 (unregistering): Port device team_slave_1 removed [ 1391.765580] team0 (unregistering): Port device team_slave_0 removed [ 1391.776508] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1391.825257] bond0 (unregistering): Releasing backup interface bond_slave_0 08:42:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1392.017478] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1392.150106] protocol 88fb is buggy, dev hsr_slave_0 [ 1392.155276] protocol 88fb is buggy, dev hsr_slave_1 [ 1392.209349] bond0 (unregistering): Released all slaves [ 1392.294400] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1392.427704] dccp_close: ABORT with 381 bytes unread 08:42:25 executing program 1: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000200, 0x102, 0x2, 0x7, 0x722b, 0x4, 0x1293, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x61f, 0x6}) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000200)={'veth0_to_bond\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_newaddr={0x40, 0x14, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r7}, [@IFA_CACHEINFO={0x14}, @IFA_LOCAL={0x14, 0x2, @local}]}, 0x40}}, 0x0) [ 1392.470394] protocol 88fb is buggy, dev hsr_slave_0 [ 1392.480589] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x6) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1392.815996] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:26 executing program 5: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80002) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='attr\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open$cgroup(&(0x7f00000004c0)={0x0, 0x70, 0x4, 0x8, 0x3, 0xfffffffffffffffd, 0x0, 0x4, 0x100, 0x9, 0x4, 0xffffffffffff8000, 0x80, 0x10001, 0x200, 0xf7bb, 0x8, 0x1, 0x1, 0x5, 0x76b, 0x3, 0x2bfbd4b8, 0x1ff, 0x7, 0xc50, 0x8001, 0x5, 0x7, 0x9, 0x9, 0xfffffffffffffc01, 0xfffffffffffff000, 0x400, 0x1f, 0xfffffffffffffffc, 0x7, 0x10000, 0x0, 0xf4, 0x2, @perf_bp={&(0x7f00000003c0), 0x4}, 0x480, 0x9, 0xadd, 0x0, 0x6a, 0x1000, 0x6}, r0, 0xa, r1, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x13, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffde5) bind$inet6(r5, &(0x7f0000000540)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}, 0xffffffffffffffff}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 1393.084425] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:26 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80002) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='attr\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open$cgroup(&(0x7f00000004c0)={0x0, 0x70, 0x4, 0x8, 0x3, 0xfffffffffffffffd, 0x0, 0x4, 0x100, 0x9, 0x4, 0xffffffffffff8000, 0x80, 0x10001, 0x200, 0xf7bb, 0x8, 0x1, 0x1, 0x5, 0x76b, 0x3, 0x2bfbd4b8, 0x1ff, 0x7, 0xc50, 0x8001, 0x5, 0x7, 0x9, 0x9, 0xfffffffffffffc01, 0xfffffffffffff000, 0x400, 0x1f, 0xfffffffffffffffc, 0x7, 0x10000, 0x0, 0xf4, 0x2, @perf_bp={&(0x7f00000003c0), 0x4}, 0x480, 0x9, 0xadd, 0x0, 0x6a, 0x1000, 0x6}, r0, 0xa, r1, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x13, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffde5) bind$inet6(r5, &(0x7f0000000540)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}, 0xffffffffffffffff}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 08:42:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1393.319618] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1393.591053] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x703000, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000001c0)={{0x7fffffff, 0x4}, 'port1\x00', 0x9, 0x8, 0x9, 0x5, 0xfffffffffffff63e, 0x7f, 0x2d3, 0x0, 0x7, 0x10001}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@gcm_256={{0x304}, "483b464fde86ac52", "0fc11dc7953aae665d60d25716401d062d0f7ba0e98d77377d9898a5298e464f", "72f1d009", "2282538821199aec"}, 0x38) fcntl$setstatus(r1, 0x4, 0x800) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) truncate(&(0x7f0000000080)='./file0\x00', 0x80000000) r3 = dup3(r0, r1, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 08:42:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:27 executing program 5: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x63, &(0x7f00000003c0)={'HL\x00'}, &(0x7f0000000480)=0x1e) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 08:42:27 executing program 1: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x63, &(0x7f00000003c0)={'HL\x00'}, &(0x7f0000000480)=0x1e) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 08:42:27 executing program 2 (fault-call:7 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1393.840927] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1393.857771] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1393.876437] FAULT_INJECTION: forcing a failure. [ 1393.876437] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1393.893606] CPU: 1 PID: 26921 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1393.900731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1393.910096] Call Trace: [ 1393.912697] dump_stack+0x138/0x19c [ 1393.916370] should_fail.cold+0x10f/0x159 [ 1393.920531] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1393.925215] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1393.930345] ? trace_hardirqs_on+0x10/0x10 [ 1393.934590] alloc_pages_current+0xec/0x1e0 [ 1393.938919] skb_page_frag_refill+0x1d3/0x3e0 [ 1393.943416] sk_page_frag_refill+0x53/0x1c0 [ 1393.947735] alloc_sg+0x127/0x6e0 [ 1393.951188] ? __local_bh_enable_ip+0x99/0x1a0 [ 1393.955780] alloc_encrypted_sg+0x8a/0x100 [ 1393.960020] ? ipv6_frag_exit+0x40/0x40 [ 1393.964000] tls_sw_sendmsg+0x902/0x1020 [ 1393.968174] ? selinux_tun_dev_create+0xc0/0xc0 [ 1393.972860] ? alloc_encrypted_sg+0x100/0x100 [ 1393.977367] ? __fget+0x237/0x370 [ 1393.980829] inet_sendmsg+0x122/0x500 [ 1393.984632] ? inet_recvmsg+0x500/0x500 [ 1393.988702] sock_sendmsg+0xce/0x110 [ 1393.992425] SYSC_sendto+0x206/0x310 [ 1393.996143] ? SYSC_connect+0x2d0/0x2d0 [ 1394.000130] ? lock_downgrade+0x6e0/0x6e0 [ 1394.004299] ? wait_for_completion+0x420/0x420 [ 1394.008890] ? __sb_end_write+0xc1/0x100 [ 1394.012965] ? fput+0xd4/0x150 [ 1394.016162] ? SyS_write+0x15e/0x230 [ 1394.019887] SyS_sendto+0x40/0x50 [ 1394.023344] ? SyS_getpeername+0x30/0x30 [ 1394.027417] do_syscall_64+0x1e8/0x640 [ 1394.031311] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1394.036166] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1394.041359] RIP: 0033:0x459829 [ 1394.044663] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1394.052370] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1394.059642] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1394.066912] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1394.074183] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1394.081458] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1394.235140] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:27 executing program 1 (fault-call:7 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:27 executing program 5 (fault-call:7 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1394.427452] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1394.445517] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1394.492419] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1394.496188] FAULT_INJECTION: forcing a failure. [ 1394.496188] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1394.506122] FAULT_INJECTION: forcing a failure. [ 1394.506122] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1394.570802] CPU: 0 PID: 26960 Comm: syz-executor.5 Not tainted 4.14.135 #31 [ 1394.578037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1394.587490] Call Trace: [ 1394.590091] dump_stack+0x138/0x19c [ 1394.593747] should_fail.cold+0x10f/0x159 [ 1394.597917] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1394.602592] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1394.607608] ? trace_hardirqs_on+0x10/0x10 [ 1394.611844] alloc_pages_current+0xec/0x1e0 [ 1394.616180] skb_page_frag_refill+0x1d3/0x3e0 [ 1394.620698] sk_page_frag_refill+0x53/0x1c0 [ 1394.625015] alloc_sg+0x127/0x6e0 [ 1394.628467] ? __local_bh_enable_ip+0x99/0x1a0 [ 1394.633051] alloc_encrypted_sg+0x8a/0x100 [ 1394.637308] ? ipv6_frag_exit+0x40/0x40 [ 1394.641294] tls_sw_sendmsg+0x902/0x1020 [ 1394.645366] ? selinux_tun_dev_create+0xc0/0xc0 [ 1394.650040] ? alloc_encrypted_sg+0x100/0x100 [ 1394.654542] ? __fget+0x237/0x370 [ 1394.658021] inet_sendmsg+0x122/0x500 [ 1394.661843] ? inet_recvmsg+0x500/0x500 [ 1394.665812] sock_sendmsg+0xce/0x110 [ 1394.669524] SYSC_sendto+0x206/0x310 [ 1394.673432] ? SYSC_connect+0x2d0/0x2d0 [ 1394.677405] ? lock_downgrade+0x6e0/0x6e0 [ 1394.681584] ? wait_for_completion+0x420/0x420 [ 1394.686189] ? __sb_end_write+0xc1/0x100 [ 1394.690256] ? fput+0xd4/0x150 [ 1394.693533] ? SyS_write+0x15e/0x230 [ 1394.697256] SyS_sendto+0x40/0x50 [ 1394.700710] ? SyS_getpeername+0x30/0x30 [ 1394.704776] do_syscall_64+0x1e8/0x640 [ 1394.708655] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1394.713497] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1394.718709] RIP: 0033:0x459829 [ 1394.721886] RSP: 002b:00007f96fd2aec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1394.729598] RAX: ffffffffffffffda RBX: 00007f96fd2aec90 RCX: 0000000000459829 [ 1394.736858] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1394.744212] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1394.751490] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96fd2af6d4 [ 1394.758755] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1394.766037] CPU: 1 PID: 26955 Comm: syz-executor.1 Not tainted 4.14.135 #31 [ 1394.773145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1394.773150] Call Trace: [ 1394.773166] dump_stack+0x138/0x19c [ 1394.773183] should_fail.cold+0x10f/0x159 [ 1394.773201] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1394.799517] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1394.804878] ? trace_hardirqs_on+0x10/0x10 [ 1394.809127] alloc_pages_current+0xec/0x1e0 [ 1394.813463] skb_page_frag_refill+0x1d3/0x3e0 [ 1394.817956] sk_page_frag_refill+0x53/0x1c0 [ 1394.822280] alloc_sg+0x127/0x6e0 [ 1394.825727] ? __local_bh_enable_ip+0x99/0x1a0 [ 1394.830310] alloc_encrypted_sg+0x8a/0x100 [ 1394.834541] ? ipv6_frag_exit+0x40/0x40 [ 1394.838517] tls_sw_sendmsg+0x902/0x1020 [ 1394.842593] ? selinux_tun_dev_create+0xc0/0xc0 [ 1394.847358] ? alloc_encrypted_sg+0x100/0x100 [ 1394.851847] ? __fget+0x237/0x370 [ 1394.855305] inet_sendmsg+0x122/0x500 [ 1394.859099] ? inet_recvmsg+0x500/0x500 [ 1394.863069] sock_sendmsg+0xce/0x110 [ 1394.866781] SYSC_sendto+0x206/0x310 [ 1394.870495] ? SYSC_connect+0x2d0/0x2d0 [ 1394.874469] ? lock_downgrade+0x6e0/0x6e0 [ 1394.878626] ? wait_for_completion+0x420/0x420 [ 1394.883207] ? __sb_end_write+0xc1/0x100 [ 1394.887272] ? fput+0xd4/0x150 [ 1394.890463] ? SyS_write+0x15e/0x230 [ 1394.894181] SyS_sendto+0x40/0x50 [ 1394.897900] ? SyS_getpeername+0x30/0x30 [ 1394.901966] do_syscall_64+0x1e8/0x640 [ 1394.905856] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1394.910710] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1394.915897] RIP: 0033:0x459829 08:42:28 executing program 2 (fault-call:7 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0xaf01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) getresuid(0x0, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f00000003c0)=0x1) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@empty, @in=@broadcast, 0x4e20, 0x7, 0x4e22, 0x0, 0x2, 0x20, 0x80, 0x3e, r3, r4}, {0x81, 0x8001, 0x101, 0x9, 0x17d3, 0x100, 0x80, 0x7}, {0x6, 0x8, 0xe51, 0x1}, 0x1, 0x6e6bb3, 0x3, 0x0, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x11}, 0x4d5}, 0x2, @in6=@loopback, 0x3503, 0x1, 0x3, 0x100, 0x2, 0x6, 0x7ff}}, 0xe8) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0x1, 0x2) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x402000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000700)=ANY=[], &(0x7f0000000740)) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000540)={0x0, 0x0, 0x3, 0x0, [], [{0x200, 0x5aba, 0x6d3, 0x3f, 0x3, 0x80000001}, {0x20, 0x2, 0x1, 0x3, 0xfffffffffffffafe, 0x3}], [[], [], []]}) r6 = dup3(r0, r1, 0x0) r7 = syz_genetlink_get_family_id$nbd(&(0x7f0000000940)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x20000800}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x74, r7, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r5}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r5}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x80000001}]}, 0x74}, 0x1, 0x0, 0x0, 0x1}, 0x40000) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000004c0)={0x0, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @loopback}, 0xa, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)='syzkaller0\x00', 0x6, 0x0, 0x8}) [ 1394.919082] RSP: 002b:00007fa11c4d9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1394.926796] RAX: ffffffffffffffda RBX: 00007fa11c4d9c90 RCX: 0000000000459829 [ 1394.934150] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1394.941425] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1394.948686] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa11c4da6d4 [ 1394.957490] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:28 executing program 5 (fault-call:7 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1395.029860] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1395.054280] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1395.066540] FAULT_INJECTION: forcing a failure. [ 1395.066540] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.092211] CPU: 0 PID: 26977 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1395.099366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1395.108774] Call Trace: [ 1395.111384] dump_stack+0x138/0x19c [ 1395.115033] should_fail.cold+0x10f/0x159 [ 1395.119195] should_failslab+0xdb/0x130 [ 1395.123182] __kmalloc+0x2f0/0x7a0 [ 1395.126744] ? tls_push_record+0x10a/0x1210 [ 1395.131084] tls_push_record+0x10a/0x1210 [ 1395.135433] tls_sw_sendmsg+0x9e8/0x1020 [ 1395.139516] ? selinux_tun_dev_create+0xc0/0xc0 [ 1395.144208] ? alloc_encrypted_sg+0x100/0x100 [ 1395.148709] ? __fget+0x237/0x370 [ 1395.152188] inet_sendmsg+0x122/0x500 [ 1395.155991] ? inet_recvmsg+0x500/0x500 [ 1395.159170] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1395.159966] sock_sendmsg+0xce/0x110 [ 1395.159979] SYSC_sendto+0x206/0x310 [ 1395.159991] ? SYSC_connect+0x2d0/0x2d0 [ 1395.160007] ? lock_downgrade+0x6e0/0x6e0 [ 1395.160033] ? wait_for_completion+0x420/0x420 08:42:28 executing program 1 (fault-call:7 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1395.160046] ? __sb_end_write+0xc1/0x100 [ 1395.160058] ? fput+0xd4/0x150 [ 1395.173401] FAULT_INJECTION: forcing a failure. [ 1395.173401] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.174850] ? SyS_write+0x15e/0x230 [ 1395.174868] SyS_sendto+0x40/0x50 [ 1395.174878] ? SyS_getpeername+0x30/0x30 [ 1395.174893] do_syscall_64+0x1e8/0x640 [ 1395.174901] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1395.174917] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1395.198698] RIP: 0033:0x459829 [ 1395.198705] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1395.198717] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1395.198724] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1395.198736] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1395.198742] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1395.198748] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1395.276806] CPU: 0 PID: 26984 Comm: syz-executor.5 Not tainted 4.14.135 #31 [ 1395.289623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1395.298973] Call Trace: [ 1395.301814] dump_stack+0x138/0x19c [ 1395.301832] should_fail.cold+0x10f/0x159 [ 1395.301848] should_failslab+0xdb/0x130 [ 1395.313582] __kmalloc+0x2f0/0x7a0 [ 1395.317134] ? tls_push_record+0x10a/0x1210 [ 1395.321469] tls_push_record+0x10a/0x1210 [ 1395.325729] tls_sw_sendmsg+0x9e8/0x1020 [ 1395.329803] ? selinux_tun_dev_create+0xc0/0xc0 [ 1395.334486] ? alloc_encrypted_sg+0x100/0x100 [ 1395.338987] ? __fget+0x237/0x370 [ 1395.342469] inet_sendmsg+0x122/0x500 [ 1395.343225] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1395.346274] ? inet_recvmsg+0x500/0x500 [ 1395.346286] sock_sendmsg+0xce/0x110 [ 1395.346296] SYSC_sendto+0x206/0x310 [ 1395.357818] FAULT_INJECTION: forcing a failure. [ 1395.357818] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.360570] ? SYSC_connect+0x2d0/0x2d0 [ 1395.360585] ? lock_downgrade+0x6e0/0x6e0 [ 1395.360609] ? wait_for_completion+0x420/0x420 [ 1395.360624] ? __sb_end_write+0xc1/0x100 [ 1395.396112] ? fput+0xd4/0x150 [ 1395.399307] ? SyS_write+0x15e/0x230 [ 1395.403022] SyS_sendto+0x40/0x50 [ 1395.406469] ? SyS_getpeername+0x30/0x30 [ 1395.410530] do_syscall_64+0x1e8/0x640 [ 1395.414422] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1395.419272] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1395.424471] RIP: 0033:0x459829 [ 1395.427648] RSP: 002b:00007f96fd2aec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1395.435376] RAX: ffffffffffffffda RBX: 00007f96fd2aec90 RCX: 0000000000459829 08:42:28 executing program 2 (fault-call:7 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1395.442645] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1395.449914] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1395.457182] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96fd2af6d4 [ 1395.464445] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1395.471734] CPU: 1 PID: 26991 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1395.478844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1395.488227] Call Trace: [ 1395.490829] dump_stack+0x138/0x19c [ 1395.490846] should_fail.cold+0x10f/0x159 [ 1395.490862] should_failslab+0xdb/0x130 [ 1395.490874] __kmalloc+0x71/0x7a0 [ 1395.490890] ? gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1395.490901] gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1395.490914] ? __lock_is_held+0xb6/0x140 [ 1395.490925] ? check_preemption_disabled+0x3c/0x250 [ 1395.490939] generic_gcmaes_encrypt+0xf4/0x130 [ 1395.502745] ? helper_rfc4106_encrypt+0x320/0x320 [ 1395.502760] ? __kmalloc+0x376/0x7a0 [ 1395.538645] gcmaes_wrapper_encrypt+0xef/0x150 08:42:28 executing program 5 (fault-call:7 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1395.543332] tls_push_record+0x906/0x1210 [ 1395.543355] tls_sw_sendmsg+0x9e8/0x1020 [ 1395.543372] ? selinux_tun_dev_create+0xc0/0xc0 [ 1395.551564] ? alloc_encrypted_sg+0x100/0x100 [ 1395.551574] ? __fget+0x237/0x370 [ 1395.551590] inet_sendmsg+0x122/0x500 [ 1395.551598] ? inet_recvmsg+0x500/0x500 [ 1395.551609] sock_sendmsg+0xce/0x110 [ 1395.551620] SYSC_sendto+0x206/0x310 [ 1395.551630] ? SYSC_connect+0x2d0/0x2d0 [ 1395.551642] ? lock_downgrade+0x6e0/0x6e0 [ 1395.551666] ? wait_for_completion+0x420/0x420 [ 1395.592463] ? __sb_end_write+0xc1/0x100 [ 1395.596639] ? fput+0xd4/0x150 [ 1395.599838] ? SyS_write+0x15e/0x230 [ 1395.603560] SyS_sendto+0x40/0x50 [ 1395.607013] ? SyS_getpeername+0x30/0x30 [ 1395.611084] do_syscall_64+0x1e8/0x640 [ 1395.614975] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1395.619833] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1395.625023] RIP: 0033:0x459829 [ 1395.626471] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1395.628217] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1395.628230] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1395.628236] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1395.628243] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1395.628249] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1395.628255] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1395.628433] net_ratelimit: 19 callbacks suppressed [ 1395.628438] protocol 88fb is buggy, dev hsr_slave_0 08:42:28 executing program 2 (fault-call:7 fault-nth:3): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1395.653655] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1395.654850] FAULT_INJECTION: forcing a failure. [ 1395.654850] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.661033] protocol 88fb is buggy, dev hsr_slave_1 [ 1395.703258] CPU: 0 PID: 27000 Comm: syz-executor.1 Not tainted 4.14.135 #31 [ 1395.720422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1395.720428] Call Trace: [ 1395.720444] dump_stack+0x138/0x19c [ 1395.720463] should_fail.cold+0x10f/0x159 [ 1395.720479] should_failslab+0xdb/0x130 [ 1395.751413] __kmalloc+0x2f0/0x7a0 [ 1395.755413] ? tls_push_record+0x10a/0x1210 [ 1395.759762] tls_push_record+0x10a/0x1210 [ 1395.761630] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1395.763926] tls_sw_sendmsg+0x9e8/0x1020 [ 1395.763945] ? selinux_tun_dev_create+0xc0/0xc0 [ 1395.775553] FAULT_INJECTION: forcing a failure. [ 1395.775553] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.778311] ? alloc_encrypted_sg+0x100/0x100 [ 1395.778326] ? __fget+0x237/0x370 [ 1395.802095] inet_sendmsg+0x122/0x500 [ 1395.805891] ? inet_recvmsg+0x500/0x500 [ 1395.809945] sock_sendmsg+0xce/0x110 [ 1395.813651] SYSC_sendto+0x206/0x310 [ 1395.817358] ? SYSC_connect+0x2d0/0x2d0 [ 1395.821335] ? lock_downgrade+0x6e0/0x6e0 [ 1395.825493] ? wait_for_completion+0x420/0x420 [ 1395.830085] ? __sb_end_write+0xc1/0x100 [ 1395.834146] ? fput+0xd4/0x150 [ 1395.837333] ? SyS_write+0x15e/0x230 [ 1395.841042] SyS_sendto+0x40/0x50 [ 1395.844486] ? SyS_getpeername+0x30/0x30 [ 1395.848571] do_syscall_64+0x1e8/0x640 [ 1395.852454] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1395.857339] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1395.862523] RIP: 0033:0x459829 [ 1395.865703] RSP: 002b:00007fa11c4d9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1395.873404] RAX: ffffffffffffffda RBX: 00007fa11c4d9c90 RCX: 0000000000459829 [ 1395.883896] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 08:42:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1395.891166] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1395.898512] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa11c4da6d4 [ 1395.905774] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1395.913054] CPU: 1 PID: 27005 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1395.920168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1395.929530] Call Trace: [ 1395.932135] dump_stack+0x138/0x19c [ 1395.935777] should_fail.cold+0x10f/0x159 [ 1395.940027] should_failslab+0xdb/0x130 [ 1395.944014] kmem_cache_alloc_node+0x287/0x780 [ 1395.948611] ? tcp_established_options+0x2c5/0x420 [ 1395.953539] __alloc_skb+0x9c/0x500 [ 1395.957161] ? skb_scrub_packet+0x4b0/0x4b0 [ 1395.961475] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1395.967094] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 1395.972101] sk_stream_alloc_skb+0xb3/0x780 [ 1395.976589] ? tcp_send_mss+0xa4/0x2f0 [ 1395.980464] ? ipv6_frag_exit+0x40/0x40 [ 1395.984427] do_tcp_sendpages+0x7d5/0x17d0 [ 1395.988656] ? gcmaes_encrypt.constprop.0+0x2f1/0xb90 [ 1395.993886] ? sk_stream_alloc_skb+0x780/0x780 [ 1395.998456] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 1396.003675] tls_push_sg+0x1e1/0x660 [ 1396.007378] tls_push_record+0xa4a/0x1210 [ 1396.011532] tls_sw_sendmsg+0x9e8/0x1020 [ 1396.015582] ? selinux_tun_dev_create+0xc0/0xc0 [ 1396.020255] ? alloc_encrypted_sg+0x100/0x100 [ 1396.024915] ? __fget+0x237/0x370 [ 1396.029187] inet_sendmsg+0x122/0x500 [ 1396.033173] ? inet_recvmsg+0x500/0x500 [ 1396.037147] sock_sendmsg+0xce/0x110 [ 1396.040866] SYSC_sendto+0x206/0x310 [ 1396.044564] ? SYSC_connect+0x2d0/0x2d0 [ 1396.048536] ? lock_downgrade+0x6e0/0x6e0 [ 1396.052770] ? wait_for_completion+0x420/0x420 [ 1396.057343] ? __sb_end_write+0xc1/0x100 [ 1396.061387] ? fput+0xd4/0x150 [ 1396.064567] ? SyS_write+0x15e/0x230 [ 1396.068263] SyS_sendto+0x40/0x50 [ 1396.071715] ? SyS_getpeername+0x30/0x30 [ 1396.075769] do_syscall_64+0x1e8/0x640 [ 1396.079736] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1396.084568] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1396.089740] RIP: 0033:0x459829 [ 1396.092914] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1396.100610] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1396.107865] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1396.115117] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1396.122468] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1396.129824] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1396.156710] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1396.170705] FAULT_INJECTION: forcing a failure. [ 1396.170705] name failslab, interval 1, probability 0, space 0, times 0 [ 1396.196802] CPU: 1 PID: 26998 Comm: syz-executor.5 Not tainted 4.14.135 #31 [ 1396.203945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1396.213303] Call Trace: [ 1396.215913] dump_stack+0x138/0x19c [ 1396.219552] should_fail.cold+0x10f/0x159 [ 1396.223693] should_failslab+0xdb/0x130 [ 1396.227652] __kmalloc+0x71/0x7a0 [ 1396.231100] ? gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1396.236278] gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1396.241281] ? __lock_is_held+0xb6/0x140 [ 1396.245512] ? check_preemption_disabled+0x3c/0x250 [ 1396.250522] generic_gcmaes_encrypt+0xf4/0x130 [ 1396.255089] ? helper_rfc4106_encrypt+0x320/0x320 [ 1396.259913] ? __kmalloc+0x376/0x7a0 [ 1396.263611] gcmaes_wrapper_encrypt+0xef/0x150 [ 1396.268266] tls_push_record+0x906/0x1210 [ 1396.272405] tls_sw_sendmsg+0x9e8/0x1020 [ 1396.276457] ? selinux_tun_dev_create+0xc0/0xc0 [ 1396.281115] ? alloc_encrypted_sg+0x100/0x100 [ 1396.285593] ? __fget+0x237/0x370 [ 1396.289039] inet_sendmsg+0x122/0x500 [ 1396.292821] ? inet_recvmsg+0x500/0x500 [ 1396.296789] sock_sendmsg+0xce/0x110 [ 1396.300483] SYSC_sendto+0x206/0x310 [ 1396.304179] ? SYSC_connect+0x2d0/0x2d0 [ 1396.308155] ? lock_downgrade+0x6e0/0x6e0 [ 1396.312317] ? wait_for_completion+0x420/0x420 [ 1396.316882] ? __sb_end_write+0xc1/0x100 [ 1396.320927] ? fput+0xd4/0x150 [ 1396.324191] ? SyS_write+0x15e/0x230 [ 1396.327888] SyS_sendto+0x40/0x50 [ 1396.331322] ? SyS_getpeername+0x30/0x30 [ 1396.335366] do_syscall_64+0x1e8/0x640 [ 1396.339244] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1396.344076] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1396.349257] RIP: 0033:0x459829 [ 1396.352428] RSP: 002b:00007f96fd2aec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1396.360120] RAX: ffffffffffffffda RBX: 00007f96fd2aec90 RCX: 0000000000459829 [ 1396.367373] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1396.374623] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1396.381877] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96fd2af6d4 [ 1396.389132] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1396.396909] protocol 88fb is buggy, dev hsr_slave_0 [ 1396.402029] protocol 88fb is buggy, dev hsr_slave_1 08:42:29 executing program 1 (fault-call:7 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:29 executing program 2 (fault-call:7 fault-nth:4): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1396.412066] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x6, 0x30}, &(0x7f0000000240)=0xc) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000280)={r3, 0x4}, 0x8) 08:42:29 executing program 5 (fault-call:7 fault-nth:3): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1396.525372] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1396.563603] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1396.597638] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1396.612364] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1396.624488] FAULT_INJECTION: forcing a failure. [ 1396.624488] name failslab, interval 1, probability 0, space 0, times 0 [ 1396.631835] protocol 88fb is buggy, dev hsr_slave_0 [ 1396.636598] CPU: 1 PID: 27036 Comm: syz-executor.5 Not tainted 4.14.135 #31 [ 1396.642076] protocol 88fb is buggy, dev hsr_slave_1 [ 1396.647858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1396.647864] Call Trace: [ 1396.647883] dump_stack+0x138/0x19c [ 1396.647903] should_fail.cold+0x10f/0x159 [ 1396.655018] protocol 88fb is buggy, dev hsr_slave_0 [ 1396.662269] should_failslab+0xdb/0x130 [ 1396.662284] kmem_cache_alloc_node+0x287/0x780 [ 1396.662298] ? tcp_established_options+0x2c5/0x420 [ 1396.662318] __alloc_skb+0x9c/0x500 [ 1396.662328] ? skb_scrub_packet+0x4b0/0x4b0 [ 1396.666748] protocol 88fb is buggy, dev hsr_slave_1 [ 1396.668598] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1396.668615] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 1396.684178] FAULT_INJECTION: forcing a failure. [ 1396.684178] name failslab, interval 1, probability 0, space 0, times 0 [ 1396.686276] sk_stream_alloc_skb+0xb3/0x780 [ 1396.729778] ? tcp_send_mss+0xa4/0x2f0 [ 1396.733676] ? ipv6_frag_exit+0x40/0x40 [ 1396.737663] do_tcp_sendpages+0x7d5/0x17d0 [ 1396.741899] ? gcmaes_encrypt.constprop.0+0x2f1/0xb90 [ 1396.747097] ? sk_stream_alloc_skb+0x780/0x780 [ 1396.751680] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 1396.756866] tls_push_sg+0x1e1/0x660 [ 1396.760586] tls_push_record+0xa4a/0x1210 [ 1396.764824] tls_sw_sendmsg+0x9e8/0x1020 [ 1396.768901] ? selinux_tun_dev_create+0xc0/0xc0 [ 1396.773662] ? alloc_encrypted_sg+0x100/0x100 [ 1396.778154] ? __fget+0x237/0x370 [ 1396.781614] inet_sendmsg+0x122/0x500 [ 1396.785919] ? inet_recvmsg+0x500/0x500 [ 1396.789985] sock_sendmsg+0xce/0x110 [ 1396.793702] SYSC_sendto+0x206/0x310 [ 1396.801159] ? SYSC_connect+0x2d0/0x2d0 [ 1396.805137] ? lock_downgrade+0x6e0/0x6e0 [ 1396.809296] ? wait_for_completion+0x420/0x420 [ 1396.813969] ? __sb_end_write+0xc1/0x100 [ 1396.818020] ? fput+0xd4/0x150 [ 1396.821198] ? SyS_write+0x15e/0x230 [ 1396.824901] SyS_sendto+0x40/0x50 [ 1396.828336] ? SyS_getpeername+0x30/0x30 [ 1396.832381] do_syscall_64+0x1e8/0x640 [ 1396.836260] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1396.841190] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1396.846372] RIP: 0033:0x459829 [ 1396.849547] RSP: 002b:00007f96fd2aec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1396.857249] RAX: ffffffffffffffda RBX: 00007f96fd2aec90 RCX: 0000000000459829 [ 1396.864503] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1396.871769] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1396.879024] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96fd2af6d4 [ 1396.886278] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1396.899726] CPU: 0 PID: 27028 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1396.906947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1396.916300] Call Trace: [ 1396.918892] dump_stack+0x138/0x19c [ 1396.922530] should_fail.cold+0x10f/0x159 [ 1396.926693] should_failslab+0xdb/0x130 [ 1396.930694] kmem_cache_alloc_node_trace+0x280/0x770 [ 1396.935812] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1396.941288] __kmalloc_node_track_caller+0x3d/0x80 [ 1396.946236] __kmalloc_reserve.isra.0+0x40/0xe0 [ 1396.950926] __alloc_skb+0xcf/0x500 [ 1396.955508] ? skb_scrub_packet+0x4b0/0x4b0 [ 1396.955522] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1396.955537] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 1396.955552] sk_stream_alloc_skb+0xb3/0x780 [ 1396.955563] ? tcp_send_mss+0xa4/0x2f0 [ 1396.970155] ? ipv6_frag_exit+0x40/0x40 [ 1396.970172] do_tcp_sendpages+0x7d5/0x17d0 [ 1396.970183] ? gcmaes_encrypt.constprop.0+0x2f1/0xb90 [ 1396.970204] ? sk_stream_alloc_skb+0x780/0x780 [ 1396.970220] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 1396.970237] tls_push_sg+0x1e1/0x660 [ 1397.005362] tls_push_record+0xa4a/0x1210 [ 1397.009539] tls_sw_sendmsg+0x9e8/0x1020 [ 1397.012859] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1397.013619] ? selinux_tun_dev_create+0xc0/0xc0 [ 1397.013643] ? alloc_encrypted_sg+0x100/0x100 [ 1397.013654] ? __fget+0x237/0x370 [ 1397.013670] inet_sendmsg+0x122/0x500 [ 1397.028639] ? inet_recvmsg+0x500/0x500 [ 1397.028654] sock_sendmsg+0xce/0x110 [ 1397.028665] SYSC_sendto+0x206/0x310 [ 1397.028677] ? SYSC_connect+0x2d0/0x2d0 [ 1397.028693] ? lock_downgrade+0x6e0/0x6e0 [ 1397.028715] ? wait_for_completion+0x420/0x420 [ 1397.063012] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1397.064571] ? __sb_end_write+0xc1/0x100 [ 1397.064591] ? fput+0xd4/0x150 [ 1397.064603] ? SyS_write+0x15e/0x230 [ 1397.064620] SyS_sendto+0x40/0x50 [ 1397.064630] ? SyS_getpeername+0x30/0x30 [ 1397.087356] FAULT_INJECTION: forcing a failure. 08:42:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r1, r0, 0x0) 08:42:30 executing program 5 (fault-call:7 fault-nth:4): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:30 executing program 2 (fault-call:7 fault-nth:5): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1397.087356] name failslab, interval 1, probability 0, space 0, times 0 [ 1397.089461] do_syscall_64+0x1e8/0x640 [ 1397.089472] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1397.089492] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1397.089499] RIP: 0033:0x459829 [ 1397.089509] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 [ 1397.104735] ORIG_RAX: 000000000000002c [ 1397.104742] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1397.104748] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1397.104754] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1397.104760] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1397.104766] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1397.105296] protocol 88fb is buggy, dev hsr_slave_0 [ 1397.105340] protocol 88fb is buggy, dev hsr_slave_1 [ 1397.168411] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1397.179992] CPU: 1 PID: 27054 Comm: syz-executor.5 Not tainted 4.14.135 #31 [ 1397.196548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1397.205916] Call Trace: [ 1397.206143] FAULT_INJECTION: forcing a failure. [ 1397.206143] name failslab, interval 1, probability 0, space 0, times 0 [ 1397.208507] dump_stack+0x138/0x19c [ 1397.208528] should_fail.cold+0x10f/0x159 [ 1397.208547] should_failslab+0xdb/0x130 [ 1397.208562] kmem_cache_alloc_node+0x287/0x780 [ 1397.208583] ? tcp_established_options+0x2c5/0x420 [ 1397.241125] __alloc_skb+0x9c/0x500 [ 1397.244759] ? skb_scrub_packet+0x4b0/0x4b0 [ 1397.249078] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1397.254172] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 1397.259182] sk_stream_alloc_skb+0xb3/0x780 [ 1397.263503] ? tcp_send_mss+0xa4/0x2f0 [ 1397.267557] ? ipv6_frag_exit+0x40/0x40 [ 1397.271526] do_tcp_sendpages+0x7d5/0x17d0 [ 1397.275754] ? gcmaes_encrypt.constprop.0+0x2f1/0xb90 [ 1397.280951] ? sk_stream_alloc_skb+0x780/0x780 [ 1397.285529] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 1397.290721] tls_push_sg+0x1e1/0x660 [ 1397.294445] tls_push_record+0xa4a/0x1210 [ 1397.298611] tls_sw_sendmsg+0x9e8/0x1020 [ 1397.302672] ? selinux_tun_dev_create+0xc0/0xc0 [ 1397.307340] ? alloc_encrypted_sg+0x100/0x100 [ 1397.311834] ? __fget+0x237/0x370 [ 1397.315282] inet_sendmsg+0x122/0x500 [ 1397.319082] ? inet_recvmsg+0x500/0x500 [ 1397.323050] sock_sendmsg+0xce/0x110 [ 1397.326757] SYSC_sendto+0x206/0x310 [ 1397.330462] ? SYSC_connect+0x2d0/0x2d0 [ 1397.334429] ? lock_downgrade+0x6e0/0x6e0 [ 1397.338583] ? wait_for_completion+0x420/0x420 [ 1397.343156] ? __sb_end_write+0xc1/0x100 [ 1397.347300] ? fput+0xd4/0x150 [ 1397.350489] ? SyS_write+0x15e/0x230 [ 1397.354207] SyS_sendto+0x40/0x50 [ 1397.357650] ? SyS_getpeername+0x30/0x30 [ 1397.361708] do_syscall_64+0x1e8/0x640 [ 1397.365586] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1397.370445] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1397.375626] RIP: 0033:0x459829 [ 1397.378809] RSP: 002b:00007f96fd2aec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1397.386512] RAX: ffffffffffffffda RBX: 00007f96fd2aec90 RCX: 0000000000459829 [ 1397.393776] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1397.401039] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1397.408306] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96fd2af6d4 [ 1397.415568] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1397.422939] CPU: 0 PID: 27061 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1397.430047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1397.439406] Call Trace: [ 1397.441994] dump_stack+0x138/0x19c [ 1397.445611] should_fail.cold+0x10f/0x159 [ 1397.449920] should_failslab+0xdb/0x130 [ 1397.453877] kmem_cache_alloc+0x47/0x780 [ 1397.457922] ? lock_acquire+0x16f/0x430 [ 1397.461911] ? check_preemption_disabled+0x3c/0x250 [ 1397.466919] skb_clone+0x129/0x320 [ 1397.470443] dev_queue_xmit_nit+0x2d8/0x940 [ 1397.474761] dev_hard_start_xmit+0xa7/0x8b0 [ 1397.479067] ? assoc_array_gc+0x11a0/0x11d0 [ 1397.483375] __dev_queue_xmit+0x1d95/0x25e0 [ 1397.487699] ? trace_hardirqs_on_caller+0x400/0x590 [ 1397.492700] ? ip6t_do_table+0xaa6/0x1860 [ 1397.496840] ? netdev_pick_tx+0x300/0x300 [ 1397.500971] ? find_held_lock+0x35/0x130 [ 1397.505028] ? ip6_finish_output+0x4f4/0xb50 [ 1397.509432] ? mark_held_locks+0xb1/0x100 [ 1397.513567] dev_queue_xmit+0x18/0x20 [ 1397.517350] ? dev_queue_xmit+0x18/0x20 [ 1397.521408] ip6_finish_output2+0x10bd/0x21b0 [ 1397.525887] ? find_held_lock+0x35/0x130 [ 1397.529932] ? ip6_forward_finish+0x480/0x480 [ 1397.534413] ? __lock_is_held+0xb6/0x140 [ 1397.538464] ? check_preemption_disabled+0x3c/0x250 [ 1397.543467] ip6_finish_output+0x4f4/0xb50 [ 1397.547688] ? ip6_finish_output+0x4f4/0xb50 [ 1397.552086] ip6_output+0x20f/0x6d0 [ 1397.555785] ? ip6_finish_output+0xb50/0xb50 [ 1397.560175] ? __lock_is_held+0xb6/0x140 [ 1397.564222] ? check_preemption_disabled+0x3c/0x250 [ 1397.569222] ? ip6_fragment+0x32c0/0x32c0 [ 1397.573359] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1397.578794] ip6_xmit+0xd53/0x1eb0 [ 1397.582322] ? ip6_finish_output2+0x21b0/0x21b0 [ 1397.586989] ? ip6_dst_check+0x16a/0x2c0 [ 1397.591032] ? save_trace+0x290/0x290 [ 1397.594828] ? ip6_append_data+0x2f0/0x2f0 [ 1397.599048] ? __lock_is_held+0xb6/0x140 [ 1397.603100] ? check_preemption_disabled+0x3c/0x250 [ 1397.608109] inet6_csk_xmit+0x286/0x4d0 [ 1397.612068] ? inet6_csk_update_pmtu+0x140/0x140 [ 1397.616809] ? tcp_md5_do_lookup+0x1d3/0x530 [ 1397.621209] __tcp_transmit_skb+0x172c/0x2fe0 [ 1397.625693] ? bictcp_cong_avoid+0xe50/0xe50 [ 1397.630084] ? __tcp_select_window+0x6e0/0x6e0 [ 1397.634668] ? kvm_clock_read+0x23/0x40 [ 1397.638633] ? sched_clock_cpu+0x1b/0x1c0 [ 1397.642786] ? tcp_small_queue_check+0x184/0x1e0 [ 1397.647542] tcp_write_xmit+0x523/0x48b0 [ 1397.651587] ? kasan_kmalloc+0xce/0xf0 [ 1397.655488] __tcp_push_pending_frames+0xa6/0x260 [ 1397.660319] tcp_push+0x415/0x610 [ 1397.663760] do_tcp_sendpages+0x1274/0x17d0 [ 1397.668082] ? gcmaes_encrypt.constprop.0+0x2f1/0xb90 [ 1397.673264] ? sk_stream_alloc_skb+0x780/0x780 [ 1397.677837] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 1397.683013] tls_push_sg+0x1e1/0x660 [ 1397.686725] tls_push_record+0xa4a/0x1210 [ 1397.690869] tls_sw_sendmsg+0x9e8/0x1020 [ 1397.694920] ? selinux_tun_dev_create+0xc0/0xc0 [ 1397.699577] ? alloc_encrypted_sg+0x100/0x100 [ 1397.704054] ? __fget+0x237/0x370 [ 1397.707496] inet_sendmsg+0x122/0x500 [ 1397.711280] ? inet_recvmsg+0x500/0x500 [ 1397.715258] sock_sendmsg+0xce/0x110 [ 1397.718971] SYSC_sendto+0x206/0x310 [ 1397.722677] ? SYSC_connect+0x2d0/0x2d0 [ 1397.726731] ? lock_downgrade+0x6e0/0x6e0 [ 1397.730879] ? wait_for_completion+0x420/0x420 [ 1397.735626] ? __sb_end_write+0xc1/0x100 [ 1397.739670] ? fput+0xd4/0x150 [ 1397.742866] ? SyS_write+0x15e/0x230 [ 1397.746567] SyS_sendto+0x40/0x50 [ 1397.750004] ? SyS_getpeername+0x30/0x30 [ 1397.754056] do_syscall_64+0x1e8/0x640 [ 1397.757926] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1397.762764] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1397.767939] RIP: 0033:0x459829 [ 1397.771115] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1397.778819] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1397.786075] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1397.793354] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 08:42:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1397.803841] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1397.812136] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r1, r0, 0x7fffd) [ 1397.861143] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1397.914790] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x1, @loopback, 0xfffffffffffffffc}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x40000, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x2, 0x4224c1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x5) dup3(r0, r1, 0x0) 08:42:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:31 executing program 2 (fault-call:7 fault-nth:6): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x4200, 0x1) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1398.047137] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1398.127178] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1398.127182] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1398.128959] FAULT_INJECTION: forcing a failure. [ 1398.128959] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1398.159214] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1398.214797] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1398.255050] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1398.295053] CPU: 1 PID: 27088 Comm: syz-executor.2 Not tainted 4.14.135 #31 08:42:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1398.302202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1398.311573] Call Trace: [ 1398.314178] dump_stack+0x138/0x19c [ 1398.317826] should_fail.cold+0x10f/0x159 [ 1398.322072] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1398.326754] ? lock_downgrade+0x6e0/0x6e0 [ 1398.330918] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1398.335951] ? check_preemption_disabled+0x3c/0x250 [ 1398.340994] alloc_pages_current+0xec/0x1e0 [ 1398.345407] ? quarantine_put+0xfa/0x1a0 [ 1398.345424] skb_page_frag_refill+0x1d3/0x3e0 [ 1398.345439] ? trace_hardirqs_on_caller+0x400/0x590 [ 1398.359020] sk_page_frag_refill+0x53/0x1c0 [ 1398.359037] alloc_sg+0x127/0x6e0 [ 1398.359054] alloc_encrypted_sg+0x8a/0x100 [ 1398.371055] ? ipv6_frag_exit+0x40/0x40 [ 1398.375079] tls_sw_sendmsg+0x902/0x1020 [ 1398.379161] ? selinux_tun_dev_create+0xc0/0xc0 [ 1398.383846] ? alloc_encrypted_sg+0x100/0x100 [ 1398.388355] ? __fget+0x237/0x370 [ 1398.391831] inet_sendmsg+0x122/0x500 [ 1398.395642] ? inet_recvmsg+0x500/0x500 [ 1398.399630] sock_sendmsg+0xce/0x110 [ 1398.403361] SYSC_sendto+0x206/0x310 [ 1398.407096] ? SYSC_connect+0x2d0/0x2d0 [ 1398.411081] ? lock_downgrade+0x6e0/0x6e0 [ 1398.415315] ? wait_for_completion+0x420/0x420 [ 1398.419885] ? __sb_end_write+0xc1/0x100 [ 1398.423935] ? fput+0xd4/0x150 [ 1398.427110] ? SyS_write+0x15e/0x230 [ 1398.430823] SyS_sendto+0x40/0x50 [ 1398.434260] ? SyS_getpeername+0x30/0x30 [ 1398.438307] do_syscall_64+0x1e8/0x640 [ 1398.442174] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1398.447004] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1398.452267] RIP: 0033:0x459829 08:42:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) sendto$inet6(r2, &(0x7f0000000080)="071da837b5a61c5b30848e6a", 0xc, 0x800, &(0x7f0000000100)={0xa, 0x4e24, 0x3, @mcast1, 0x3}, 0x1c) 08:42:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x75f67fe6cf3e9a38) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "863b719663c62415", "42d22a760c3e0ab74d5f12973e222555", "a552d8bb", "70314509a10e5aaa"}, 0x1b4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x20102, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) getdents64(r2, &(0x7f0000000200)=""/4096, 0x1000) r3 = gettid() r4 = getpgid(0x0) rt_tgsigqueueinfo(r3, r4, 0x2b, &(0x7f0000000140)={0x2f, 0x1, 0xa}) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1398.455441] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1398.463132] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1398.470563] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1398.477903] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1398.485329] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1398.492675] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1398.574903] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1398.582358] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1398.632408] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1398.686079] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1398.697186] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1398.740673] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x80000) 08:42:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:32 executing program 2 (fault-call:7 fault-nth:7): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x1, 0x0) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f00000001c0)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000100)={0x1}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)='bond0\x00') setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:32 executing program 1: lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0xcb, @local}, 0x1c) listen(r1, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, [], [{0x0, 0xdf7, 0x0, 0x10000000000000, 0xb1, 0x3}, {0x10000, 0x1, 0x3ff, 0x1, 0x5, 0x9}], [[], [], [], []]}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x80000) 08:42:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x2, 0x20004004, &(0x7f0000000080)={0xa, 0x20004e22, 0x0, @local, 0xffffffffffffffff}, 0x3b7) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() lchown(&(0x7f0000000040)='./file0\x00', r2, r3) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) fcntl$setflags(r1, 0x2, 0x1) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x200800, 0x0) ioctl$RTC_PIE_OFF(r4, 0x7006) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000240)={0x3, &(0x7f0000000200)=[{}, {0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r4, 0xc0086423, &(0x7f0000000280)={r5, 0x1}) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1398.887038] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1398.908584] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1398.965939] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1398.968119] FAULT_INJECTION: forcing a failure. [ 1398.968119] name fail_page_alloc, interval 1, probability 0, space 0, times 0 08:42:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0xd9c}, 0x1c) listen(r1, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0xc0) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f00000002c0)=""/244) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10000) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f0000000180)) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r2, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm_plock\x00', 0x40000, 0x0) r4 = request_key(&(0x7f0000000400)='logon\x00', &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000000480)='/dev/input/mice\x00', 0xfffffffffffffff9) keyctl$KEYCTL_PKEY_QUERY(0x18, r4, 0x0, &(0x7f00000004c0)='\x00', &(0x7f0000000500)) [ 1399.019126] CPU: 1 PID: 27138 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1399.026560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1399.035939] Call Trace: [ 1399.038575] dump_stack+0x138/0x19c [ 1399.042221] should_fail.cold+0x10f/0x159 [ 1399.046450] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1399.051119] ? lock_downgrade+0x6e0/0x6e0 [ 1399.051139] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1399.051154] ? check_preemption_disabled+0x3c/0x250 [ 1399.051168] alloc_pages_current+0xec/0x1e0 [ 1399.051177] ? quarantine_put+0xfa/0x1a0 [ 1399.051192] skb_page_frag_refill+0x1d3/0x3e0 [ 1399.051200] ? trace_hardirqs_on_caller+0x400/0x590 [ 1399.051212] sk_page_frag_refill+0x53/0x1c0 [ 1399.060528] alloc_sg+0x127/0x6e0 [ 1399.060545] alloc_encrypted_sg+0x8a/0x100 [ 1399.060555] ? ipv6_frag_exit+0x40/0x40 [ 1399.060564] tls_sw_sendmsg+0x902/0x1020 [ 1399.060582] ? selinux_tun_dev_create+0xc0/0xc0 [ 1399.060597] ? alloc_encrypted_sg+0x100/0x100 [ 1399.060606] ? __fget+0x237/0x370 [ 1399.060621] inet_sendmsg+0x122/0x500 [ 1399.060630] ? inet_recvmsg+0x500/0x500 [ 1399.060642] sock_sendmsg+0xce/0x110 [ 1399.094851] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1399.095723] SYSC_sendto+0x206/0x310 [ 1399.095735] ? SYSC_connect+0x2d0/0x2d0 [ 1399.095750] ? lock_downgrade+0x6e0/0x6e0 [ 1399.150213] ? wait_for_completion+0x420/0x420 [ 1399.154892] ? __sb_end_write+0xc1/0x100 [ 1399.158952] ? fput+0xd4/0x150 [ 1399.162143] ? SyS_write+0x15e/0x230 [ 1399.165869] SyS_sendto+0x40/0x50 [ 1399.169330] ? SyS_getpeername+0x30/0x30 [ 1399.173392] do_syscall_64+0x1e8/0x640 [ 1399.177293] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1399.182337] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1399.187790] RIP: 0033:0x459829 [ 1399.190981] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1399.198691] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1399.205953] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 08:42:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) write$P9_ROPEN(r2, &(0x7f0000000100)={0x18, 0x71, 0x1, {{0x8, 0x1, 0x6}, 0xfff}}, 0x18) dup3(r0, r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000180)={{0x9, 0x4}, {0x6, 0x3ff}, 0x4, 0x2}) 08:42:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1399.213212] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1399.220465] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1399.227723] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(0xffffffffffffffff, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1399.315038] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1399.315069] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1399.420771] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1399.437747] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x4e24, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x401}, {0xa, 0x4e20, 0x20, @remote, 0x2}, 0x4, [0x7f, 0x7, 0x81, 0xfffffffffffffffc, 0x100000001, 0x6, 0x494f, 0x9]}, 0x5c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0xffffff24) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:32 executing program 2 (fault-call:7 fault-nth:8): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) sendmsg$tipc(r2, &(0x7f0000001380)={&(0x7f0000000080)=@id={0x1e, 0x3, 0x0, {0x4e24, 0x1}}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000180)="e4ab3e7ee8efd9f9fe95662b70bb0a0edc4a1ab2de0f70a0e83d1d40152e5ea8fb536c4d6b611ba3dcd5bc7834b5efbc30fcca47c9396ff2d437e70a858936e0a7a0fe97cd17ff7bdcfbff6d325100c84270e9082dec51c98efc7e878939189273", 0x61}, {&(0x7f0000000200)="d5552b330fdd1cf8d4b6507868a15d85f114b41e358a866ac0dd6b951ec5a8bec834e51cf16e2734edbe3c5dd4198e362baeeec1f25aff7c0d9a017bb0e783d360d41b30dbd1152689a1f5de7a7bd42f756f6e72f0fee755ce7ed08dbe04711bf8e618aaf59cc567174503a3de4508defee296ac1d3063fbfc2054c448bf54cdc9a2febc5830d54866c1cbe2f3e71b8aca2204c6691bc3dc5f9849a7ad09cc01f30622aa5693e44d7d63ea70174f549e43b076146b95", 0xb6}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="5d8e447bd2f66a6753dc365e89c5b3ac30cec98e600b9bff2a63657f0c9eeda6c440efc61c57f36c5c6a941f7f686abf29d1bd564d4edae6092b8011df3a33c1bb9021ccdab6701d929542e241", 0x4d}], 0x4, &(0x7f0000001340)="160cf2bfdf4086769aca8432c729f113423e4621c86595425da2f3eadfdaea61b143785bee46147cb6b0634514ad548509a5f918f453a055c9d8e946a557", 0x3e, 0x40000}, 0x40001) [ 1399.773724] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1399.794426] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1399.830231] FAULT_INJECTION: forcing a failure. [ 1399.830231] name failslab, interval 1, probability 0, space 0, times 0 [ 1399.843747] CPU: 0 PID: 27182 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1399.850975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1399.860351] Call Trace: [ 1399.862940] dump_stack+0x138/0x19c [ 1399.866561] should_fail.cold+0x10f/0x159 [ 1399.870710] should_failslab+0xdb/0x130 [ 1399.874682] __kmalloc+0x71/0x7a0 [ 1399.884733] ? gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1399.889907] gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1399.894909] ? __lock_is_held+0xb6/0x140 [ 1399.898958] ? check_preemption_disabled+0x3c/0x250 [ 1399.904048] generic_gcmaes_encrypt+0xf4/0x130 [ 1399.908703] ? helper_rfc4106_encrypt+0x320/0x320 [ 1399.913527] ? __kmalloc+0x376/0x7a0 [ 1399.917237] gcmaes_wrapper_encrypt+0xef/0x150 [ 1399.921804] tls_push_record+0x906/0x1210 [ 1399.925942] tls_sw_sendmsg+0x9e8/0x1020 [ 1399.929993] ? selinux_tun_dev_create+0xc0/0xc0 [ 1399.934655] ? alloc_encrypted_sg+0x100/0x100 [ 1399.939144] ? __fget+0x237/0x370 [ 1399.942604] inet_sendmsg+0x122/0x500 [ 1399.946472] ? inet_recvmsg+0x500/0x500 [ 1399.950431] sock_sendmsg+0xce/0x110 [ 1399.954129] SYSC_sendto+0x206/0x310 [ 1399.958882] ? SYSC_connect+0x2d0/0x2d0 [ 1399.962841] ? lock_downgrade+0x6e0/0x6e0 [ 1399.966982] ? wait_for_completion+0x420/0x420 [ 1399.971696] ? __sb_end_write+0xc1/0x100 [ 1399.975745] ? fput+0xd4/0x150 [ 1399.978922] ? SyS_write+0x15e/0x230 [ 1399.982729] SyS_sendto+0x40/0x50 [ 1399.986172] ? SyS_getpeername+0x30/0x30 [ 1399.990222] do_syscall_64+0x1e8/0x640 [ 1399.994093] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1400.000056] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1400.005234] RIP: 0033:0x459829 [ 1400.008495] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1400.016286] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1400.023546] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1400.030813] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1400.038415] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1400.045668] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1400.065890] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1400.081766] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:33 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000380)={0x57, 0x5, 0xe4, {0x1, 0x1}, {0x4, 0x4}, @period={0x5a, 0x7, 0x1f, 0xff, 0x80000001, {0x9, 0x1000, 0x3ff}, 0x1, &(0x7f0000000340)=[0x8]}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) fallocate(0xffffffffffffffff, 0x20, 0x10000000000, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x800, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setxattr$trusted_overlay_opaque(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x1) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f00000004c0)) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x317, {0x0, 0x0, 0x0, 0x0, 0x6}}, 0xe) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x40012040, 0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) getresgid(&(0x7f0000000180), &(0x7f0000000280), &(0x7f0000000340)) pipe(&(0x7f0000000440)={0xffffffffffffffff}) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, 0x0) r5 = socket$inet6(0xa, 0x0, 0x200000000ee47) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000600)}}, 0x10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0), 0x4) fcntl$addseals(r5, 0x409, 0x9) setsockopt$inet6_udp_int(r5, 0x11, 0x100000000a, &(0x7f0000000240)=0x800000001, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) 08:42:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$UHID_CREATE(r2, &(0x7f0000000240)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000180)=""/156, 0x9c, 0x4, 0x9, 0x7f, 0x9, 0x40}, 0x120) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x2c5, 0x40000, 0x0, 0xb) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r0, r1, 0x0) ioctl$KDGKBLED(r3, 0x4b64, &(0x7f0000000080)) 08:42:33 executing program 2 (fault-call:7 fault-nth:9): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(0xffffffffffffffff, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = dup(r1) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={0x0, 0xfff}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000180)={r3, @in={{0x2, 0x4e21, @local}}, 0x6, 0x4eb1, 0x7, 0x7ff, 0x40}, 0x98) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) fstat(r0, &(0x7f0000000240)) [ 1400.264806] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000100)=r2, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1400.325868] FAULT_INJECTION: forcing a failure. [ 1400.325868] name failslab, interval 1, probability 0, space 0, times 0 [ 1400.356333] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1400.357214] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1400.387431] CPU: 0 PID: 27202 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1400.394575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1400.403941] Call Trace: [ 1400.406553] dump_stack+0x138/0x19c [ 1400.410242] should_fail.cold+0x10f/0x159 [ 1400.414413] should_failslab+0xdb/0x130 [ 1400.418402] kmem_cache_alloc_node+0x287/0x780 [ 1400.423259] ? tcp_established_options+0x2c5/0x420 [ 1400.426305] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1400.428205] __alloc_skb+0x9c/0x500 [ 1400.428218] ? skb_scrub_packet+0x4b0/0x4b0 [ 1400.428230] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1400.428244] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 1400.456584] sk_stream_alloc_skb+0xb3/0x780 [ 1400.460925] ? tcp_send_mss+0xa4/0x2f0 [ 1400.464822] ? ipv6_frag_exit+0x40/0x40 [ 1400.468811] do_tcp_sendpages+0x7d5/0x17d0 [ 1400.473054] ? gcmaes_encrypt.constprop.0+0x2f1/0xb90 [ 1400.478262] ? sk_stream_alloc_skb+0x780/0x780 [ 1400.482857] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 1400.488070] tls_push_sg+0x1e1/0x660 [ 1400.491834] tls_push_record+0xa4a/0x1210 [ 1400.496014] tls_sw_sendmsg+0x9e8/0x1020 [ 1400.500084] ? selinux_tun_dev_create+0xc0/0xc0 [ 1400.504763] ? alloc_encrypted_sg+0x100/0x100 [ 1400.506069] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1400.509283] ? __fget+0x237/0x370 [ 1400.509309] inet_sendmsg+0x122/0x500 [ 1400.509320] ? inet_recvmsg+0x500/0x500 [ 1400.509331] sock_sendmsg+0xce/0x110 [ 1400.509341] SYSC_sendto+0x206/0x310 [ 1400.538248] ? SYSC_connect+0x2d0/0x2d0 [ 1400.542250] ? lock_downgrade+0x6e0/0x6e0 [ 1400.546416] ? wait_for_completion+0x420/0x420 [ 1400.551019] ? __sb_end_write+0xc1/0x100 [ 1400.555092] ? fput+0xd4/0x150 [ 1400.558304] ? SyS_write+0x15e/0x230 [ 1400.562052] SyS_sendto+0x40/0x50 [ 1400.565524] ? SyS_getpeername+0x30/0x30 [ 1400.569596] do_syscall_64+0x1e8/0x640 [ 1400.573485] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1400.578450] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1400.583713] RIP: 0033:0x459829 [ 1400.587084] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1400.594799] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1400.602069] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1400.609332] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1400.616588] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 08:42:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1400.623846] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCSSERIAL(r2, 0x541f, &(0x7f0000000200)={0x7fffffff, 0x7, 0x2d45, 0x1, 0x9, 0x100, 0x400, 0x7, 0x3d, 0x0, 0x1f, 0x4, 0x6, 0x0, &(0x7f0000000180)=""/125, 0x3, 0x4, 0x4}) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:34 executing program 2 (fault-call:7 fault-nth:10): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{}, "72441cb4ccb55da7", "85742d71b721c8df260e561dcbde2affb7dba06b078d631b701d3ce2b9548ce4", "75673ce8", "ed6730f319aafb09"}, 0x38) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1400.790644] net_ratelimit: 18 callbacks suppressed [ 1400.790651] protocol 88fb is buggy, dev hsr_slave_0 [ 1400.800703] protocol 88fb is buggy, dev hsr_slave_1 [ 1400.805776] protocol 88fb is buggy, dev hsr_slave_0 [ 1400.810850] protocol 88fb is buggy, dev hsr_slave_1 [ 1400.836808] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1400.837741] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1400.854101] FAULT_INJECTION: forcing a failure. [ 1400.854101] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1400.869465] CPU: 1 PID: 27232 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1400.876581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1400.885959] Call Trace: [ 1400.888566] dump_stack+0x138/0x19c [ 1400.892208] should_fail.cold+0x10f/0x159 [ 1400.896351] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1400.901019] ? save_stack_trace+0x16/0x20 [ 1400.905166] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1400.910168] ? inet_sendmsg+0x122/0x500 [ 1400.914129] ? sock_sendmsg+0xce/0x110 [ 1400.917999] ? SYSC_sendto+0x206/0x310 [ 1400.921908] cache_grow_begin+0x80/0x400 [ 1400.925973] __kmalloc+0x6bf/0x7a0 [ 1400.929501] ? gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1400.934691] gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1400.939693] ? __lock_is_held+0xb6/0x140 [ 1400.943738] ? check_preemption_disabled+0x3c/0x250 [ 1400.948742] generic_gcmaes_encrypt+0xf4/0x130 [ 1400.954852] ? helper_rfc4106_encrypt+0x320/0x320 [ 1400.959680] ? __kmalloc+0x376/0x7a0 [ 1400.963384] gcmaes_wrapper_encrypt+0xef/0x150 [ 1400.967982] tls_push_record+0x906/0x1210 [ 1400.972218] tls_sw_sendmsg+0x9e8/0x1020 [ 1400.976266] ? selinux_tun_dev_create+0xc0/0xc0 [ 1400.980923] ? alloc_encrypted_sg+0x100/0x100 [ 1400.985403] ? __fget+0x237/0x370 [ 1400.988846] inet_sendmsg+0x122/0x500 [ 1400.992646] ? inet_recvmsg+0x500/0x500 [ 1400.996603] sock_sendmsg+0xce/0x110 [ 1401.000302] SYSC_sendto+0x206/0x310 [ 1401.004011] ? SYSC_connect+0x2d0/0x2d0 [ 1401.007982] ? lock_downgrade+0x6e0/0x6e0 [ 1401.012124] ? wait_for_completion+0x420/0x420 [ 1401.016700] ? __sb_end_write+0xc1/0x100 [ 1401.020752] ? fput+0xd4/0x150 [ 1401.023932] ? SyS_write+0x15e/0x230 [ 1401.028674] SyS_sendto+0x40/0x50 [ 1401.032123] ? SyS_getpeername+0x30/0x30 [ 1401.036171] do_syscall_64+0x1e8/0x640 [ 1401.040063] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1401.044910] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1401.050184] RIP: 0033:0x459829 [ 1401.053360] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1401.061074] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1401.068333] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1401.075632] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 08:42:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(0xffffffffffffffff, r1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1401.082986] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1401.090256] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1401.105970] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:34 executing program 2 (fault-call:7 fault-nth:11): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x6, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x9, 0x2, 0x3, 0x7, 0x3}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000240)={r3, 0x7, 0x7}, &(0x7f0000000280)=0x8) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x4) [ 1401.165714] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1401.226735] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x0, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) dup3(r0, r1, 0x0) [ 1401.270120] protocol 88fb is buggy, dev hsr_slave_0 [ 1401.275264] protocol 88fb is buggy, dev hsr_slave_1 [ 1401.280445] protocol 88fb is buggy, dev hsr_slave_0 [ 1401.285617] protocol 88fb is buggy, dev hsr_slave_1 [ 1401.293845] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1401.313346] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1401.326222] FAULT_INJECTION: forcing a failure. [ 1401.326222] name failslab, interval 1, probability 0, space 0, times 0 [ 1401.358829] CPU: 0 PID: 27249 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1401.365976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1401.375338] Call Trace: [ 1401.377944] dump_stack+0x138/0x19c [ 1401.381581] should_fail.cold+0x10f/0x159 [ 1401.385844] should_failslab+0xdb/0x130 [ 1401.389861] kmem_cache_alloc_node+0x287/0x780 [ 1401.392227] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1401.394445] ? tcp_established_options+0x2c5/0x420 [ 1401.394469] __alloc_skb+0x9c/0x500 [ 1401.394480] ? skb_scrub_packet+0x4b0/0x4b0 [ 1401.394494] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1401.422764] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 1401.427798] sk_stream_alloc_skb+0xb3/0x780 [ 1401.432130] ? tcp_send_mss+0xa4/0x2f0 [ 1401.436026] ? ipv6_frag_exit+0x40/0x40 [ 1401.440003] do_tcp_sendpages+0x7d5/0x17d0 [ 1401.444233] ? gcmaes_encrypt.constprop.0+0x2f1/0xb90 [ 1401.449417] ? sk_stream_alloc_skb+0x780/0x780 [ 1401.454001] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 1401.459193] tls_push_sg+0x1e1/0x660 [ 1401.462902] tls_push_record+0xa4a/0x1210 [ 1401.467039] tls_sw_sendmsg+0x9e8/0x1020 [ 1401.471097] ? selinux_tun_dev_create+0xc0/0xc0 [ 1401.475779] ? alloc_encrypted_sg+0x100/0x100 [ 1401.477410] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1401.480270] ? __fget+0x237/0x370 [ 1401.480292] inet_sendmsg+0x122/0x500 [ 1401.480302] ? inet_recvmsg+0x500/0x500 [ 1401.480314] sock_sendmsg+0xce/0x110 [ 1401.480324] SYSC_sendto+0x206/0x310 [ 1401.480333] ? SYSC_connect+0x2d0/0x2d0 [ 1401.480345] ? lock_downgrade+0x6e0/0x6e0 08:42:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0xfffffffffffffeb8) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000100)={0x8001005, 0x7ff, 0x1}) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2, 0x0) dup3(r1, r1, 0x0) [ 1401.480369] ? wait_for_completion+0x420/0x420 [ 1401.522021] ? __sb_end_write+0xc1/0x100 [ 1401.526080] ? fput+0xd4/0x150 [ 1401.529268] ? SyS_write+0x15e/0x230 [ 1401.532979] SyS_sendto+0x40/0x50 [ 1401.536426] ? SyS_getpeername+0x30/0x30 [ 1401.540489] do_syscall_64+0x1e8/0x640 [ 1401.544383] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1401.549242] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1401.554432] RIP: 0033:0x459829 [ 1401.557611] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 08:42:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1401.565318] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1401.565323] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1401.565328] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1401.565332] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1401.565337] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:34 executing program 2 (fault-call:7 fault-nth:12): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000080)={0xa, 0x20004e22, 0xfffffffffffffffe, @loopback, 0x7ff}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1401.692409] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1401.704817] FAULT_INJECTION: forcing a failure. [ 1401.704817] name failslab, interval 1, probability 0, space 0, times 0 [ 1401.733133] CPU: 0 PID: 27270 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1401.740279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1401.740284] Call Trace: [ 1401.740303] dump_stack+0x138/0x19c [ 1401.740322] should_fail.cold+0x10f/0x159 [ 1401.740337] should_failslab+0xdb/0x130 [ 1401.740351] __kmalloc+0x71/0x7a0 [ 1401.740366] ? gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1401.740379] gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1401.740393] ? __lock_is_held+0xb6/0x140 [ 1401.740405] ? check_preemption_disabled+0x3c/0x250 [ 1401.740420] generic_gcmaes_encrypt+0xf4/0x130 [ 1401.740430] ? helper_rfc4106_encrypt+0x320/0x320 [ 1401.740438] ? __kmalloc+0x376/0x7a0 [ 1401.740451] gcmaes_wrapper_encrypt+0xef/0x150 [ 1401.740464] tls_push_record+0x906/0x1210 [ 1401.740485] tls_sw_sendmsg+0x9e8/0x1020 [ 1401.740501] ? selinux_tun_dev_create+0xc0/0xc0 [ 1401.740515] ? alloc_encrypted_sg+0x100/0x100 [ 1401.760209] ? __fget+0x237/0x370 [ 1401.760230] inet_sendmsg+0x122/0x500 [ 1401.760239] ? inet_recvmsg+0x500/0x500 [ 1401.760249] sock_sendmsg+0xce/0x110 [ 1401.760259] SYSC_sendto+0x206/0x310 [ 1401.760269] ? SYSC_connect+0x2d0/0x2d0 [ 1401.760283] ? lock_downgrade+0x6e0/0x6e0 [ 1401.778499] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1401.782043] ? wait_for_completion+0x420/0x420 [ 1401.782060] ? __sb_end_write+0xc1/0x100 [ 1401.782070] ? fput+0xd4/0x150 [ 1401.782078] ? SyS_write+0x15e/0x230 08:42:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x2200, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000100)={0x0, 0x5, 0x30, 0x80, 0xffffffffffffffa2}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000001c0)={r3, 0x5, 0x3, [0x20, 0x40, 0x800]}, 0xe) dup3(r0, r1, 0x0) [ 1401.782092] SyS_sendto+0x40/0x50 [ 1401.782100] ? SyS_getpeername+0x30/0x30 [ 1401.782115] do_syscall_64+0x1e8/0x640 [ 1401.874966] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1401.877586] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1401.877607] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1401.877616] RIP: 0033:0x459829 [ 1401.877622] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1401.877632] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 08:42:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000180)={{0xffffffffffffffff, 0x3, 0x671, 0x0, 0x9}, 0x100, 0x8, 0x7fffffff}) [ 1401.877640] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1401.910144] protocol 88fb is buggy, dev hsr_slave_0 [ 1401.915355] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1401.915362] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1401.915368] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1401.926425] protocol 88fb is buggy, dev hsr_slave_1 08:42:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, 0xffffffffffffffff, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:35 executing program 2 (fault-call:7 fault-nth:13): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1402.039220] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1402.081702] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1402.094568] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e23, 0xe46a, @rand_addr="1d2908206115cdccaa2b804c995ff410", 0x3}, {0xa, 0x4e21, 0x3, @loopback, 0x40}, 0x6, [0x81, 0x6, 0x6, 0x0, 0x101, 0x1f, 0x9cbb, 0x3]}, 0x5c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1402.122872] FAULT_INJECTION: forcing a failure. [ 1402.122872] name failslab, interval 1, probability 0, space 0, times 0 [ 1402.134225] CPU: 0 PID: 27291 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1402.141366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1402.150735] Call Trace: [ 1402.153335] dump_stack+0x138/0x19c [ 1402.156979] should_fail.cold+0x10f/0x159 [ 1402.161139] should_failslab+0xdb/0x130 [ 1402.165137] kmem_cache_alloc+0x47/0x780 [ 1402.169217] ? lock_acquire+0x16f/0x430 [ 1402.173205] ? check_preemption_disabled+0x3c/0x250 [ 1402.178234] skb_clone+0x129/0x320 [ 1402.181796] dev_queue_xmit_nit+0x2d8/0x940 [ 1402.183578] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1402.186132] dev_hard_start_xmit+0xa7/0x8b0 [ 1402.186149] ? assoc_array_gc+0x11a0/0x11d0 [ 1402.186169] __dev_queue_xmit+0x1d95/0x25e0 [ 1402.186182] ? trace_hardirqs_on_caller+0x400/0x590 [ 1402.186196] ? netdev_pick_tx+0x300/0x300 [ 1402.200903] ? find_held_lock+0x35/0x130 [ 1402.200915] ? ip6_finish_output+0x4f4/0xb50 [ 1402.200929] ? mark_held_locks+0xb1/0x100 [ 1402.200944] dev_queue_xmit+0x18/0x20 [ 1402.200952] ? dev_queue_xmit+0x18/0x20 [ 1402.200962] ip6_finish_output2+0x10bd/0x21b0 [ 1402.200975] ? ip6_forward_finish+0x480/0x480 [ 1402.200985] ? __lock_is_held+0xb6/0x140 [ 1402.200995] ? check_preemption_disabled+0x3c/0x250 [ 1402.201012] ip6_finish_output+0x4f4/0xb50 [ 1402.201020] ? ip6_finish_output+0x4f4/0xb50 [ 1402.201030] ip6_output+0x20f/0x6d0 [ 1402.201039] ? ip6_finish_output+0xb50/0xb50 [ 1402.201046] ? __lock_is_held+0xb6/0x140 [ 1402.201053] ? check_preemption_disabled+0x3c/0x250 [ 1402.201062] ? ip6_fragment+0x32c0/0x32c0 [ 1402.201072] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1402.201081] ip6_xmit+0xd53/0x1eb0 [ 1402.201098] ? ip6_finish_output2+0x21b0/0x21b0 [ 1402.201105] ? ip6_dst_check+0x76/0x2c0 [ 1402.201115] ? save_trace+0x290/0x290 [ 1402.201124] ? ip6_append_data+0x2f0/0x2f0 [ 1402.201134] ? __lock_is_held+0xb6/0x140 [ 1402.201141] ? check_preemption_disabled+0x3c/0x250 [ 1402.201159] inet6_csk_xmit+0x286/0x4d0 [ 1402.201174] ? inet6_csk_update_pmtu+0x140/0x140 [ 1402.209883] ? tcp_md5_do_lookup+0x1d3/0x530 [ 1402.209909] __tcp_transmit_skb+0x172c/0x2fe0 [ 1402.209931] ? __tcp_select_window+0x6e0/0x6e0 [ 1402.209947] ? kvm_clock_read+0x23/0x40 [ 1402.348464] ? sched_clock_cpu+0x1b/0x1c0 [ 1402.352604] ? tcp_small_queue_check+0x184/0x1e0 [ 1402.357344] tcp_write_xmit+0x523/0x48b0 [ 1402.361390] ? tcp_current_mss+0x1dc/0x2f0 [ 1402.365619] tcp_push_one+0xc1/0xf0 [ 1402.369233] do_tcp_sendpages+0xe70/0x17d0 [ 1402.373550] ? sk_stream_alloc_skb+0x780/0x780 [ 1402.378134] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 1402.383317] tls_push_sg+0x1e1/0x660 [ 1402.387023] tls_push_record+0xa4a/0x1210 [ 1402.391173] tls_sw_sendmsg+0x9e8/0x1020 [ 1402.395229] ? selinux_tun_dev_create+0xc0/0xc0 [ 1402.401038] ? alloc_encrypted_sg+0x100/0x100 [ 1402.405521] ? __fget+0x237/0x370 [ 1402.408962] inet_sendmsg+0x122/0x500 [ 1402.412919] ? inet_recvmsg+0x500/0x500 [ 1402.416873] sock_sendmsg+0xce/0x110 [ 1402.420571] SYSC_sendto+0x206/0x310 [ 1402.424267] ? SYSC_connect+0x2d0/0x2d0 [ 1402.428224] ? lock_downgrade+0x6e0/0x6e0 [ 1402.432361] ? wait_for_completion+0x420/0x420 [ 1402.436932] ? __sb_end_write+0xc1/0x100 [ 1402.441003] ? fput+0xd4/0x150 [ 1402.444182] ? SyS_write+0x15e/0x230 [ 1402.447882] SyS_sendto+0x40/0x50 [ 1402.451317] ? SyS_getpeername+0x30/0x30 [ 1402.455364] do_syscall_64+0x1e8/0x640 [ 1402.459230] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1402.464075] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1402.469257] RIP: 0033:0x459829 08:42:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="051cc2ff3971326f"], &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='nsfs\x00', 0x0, &(0x7f0000000300)='/selinux/status\x00') timerfd_create(0xb, 0x800) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0xffffffffffffffc0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f00000001c0)={r3, 0x80000, r4}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000005c0)=0x0) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0)=0x0, &(0x7f0000000700), &(0x7f0000000740)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000780)={0x0}, &(0x7f00000007c0)=0xc) fstat(r2, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880)={0x0, 0x0, 0x0}, &(0x7f00000008c0)=0xc) r11 = getpgrp(0x0) fstat(r2, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000a00)=0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a40)={0x0, 0x0}, &(0x7f0000000a80)=0xc) r16 = getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b00)={0xffffffffffffffff, r2, 0x0, 0x1, &(0x7f0000000ac0)='\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000b40)={{{@in6=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000c40)=0xe8) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r2, &(0x7f0000000e00)=[{&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000480)="db21a06e4d5b407acdc77657195856a296d03f0a107d2e4bf0236570625957db1f966c18096e91f593176597c9061a40fa92f182f6959fc67a72", 0x3a}, {&(0x7f00000004c0)="17de817debb87c720f9bea6b2adfaebb12763331d9c6bb975b5432cfc858714552c9b7946e101732049875381f9f7a936f4ec4d3263c57a7a32d788ed64f7f8adbe03004f5735aec6a4700f1a43e9cef4b93b5cdd03415a79ec8a741b6e03b3792ca21d0b5f8f167621c66b89ed5b3f80f9091ccb82f320baad16f3d0a196c6d9fe18f9490b912b1f2fce9ce5ebaa324e791c1655c74ccefcd693d6690", 0x9d}], 0x2, &(0x7f0000000d40)=[@cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, r10}}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @cred={{0x1c, 0x1, 0x2, {r14, r15, r16}}}, @cred={{0x1c, 0x1, 0x2, {r17, r18, r19}}}, @rights={{0x1c, 0x1, 0x1, [r2, r4, r4]}}], 0xc0}], 0x1, 0x40010) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000000280)={0x1, 0x400000000006, 0x85, 0x4000000006, 0x8, 0x6}) ioctl$PPPIOCGNPMODE(r2, 0xc008744c, &(0x7f00000003c0)) accept$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000380)=0x1c) dup3(r0, r1, 0x80000) [ 1402.472430] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1402.480207] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1402.487474] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1402.494750] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1402.502003] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1402.509258] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0xe16c, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xff}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000100)=0x3) dup3(r0, r1, 0x0) [ 1402.560059] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:35 executing program 2 (fault-call:7 fault-nth:14): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1402.655428] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x8}, 0x1c) listen(r1, 0x0) munlockall() sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) socket$packet(0x11, 0x2, 0x300) [ 1402.705249] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1402.745138] FAULT_INJECTION: forcing a failure. [ 1402.745138] name failslab, interval 1, probability 0, space 0, times 0 [ 1402.765820] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1402.781115] CPU: 1 PID: 27317 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1402.788969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1402.798334] Call Trace: [ 1402.801038] dump_stack+0x138/0x19c [ 1402.804694] should_fail.cold+0x10f/0x159 [ 1402.808866] should_failslab+0xdb/0x130 [ 1402.812958] kmem_cache_alloc_node+0x287/0x780 [ 1402.817552] ? tcp_write_xmit+0xa48/0x48b0 [ 1402.821829] __alloc_skb+0x9c/0x500 [ 1402.825498] ? skb_scrub_packet+0x4b0/0x4b0 [ 1402.829832] sk_stream_alloc_skb+0xb3/0x780 [ 1402.834227] ? ipv6_frag_exit+0x40/0x40 [ 1402.838328] do_tcp_sendpages+0x7d5/0x17d0 [ 1402.838353] ? sk_stream_alloc_skb+0x780/0x780 [ 1402.838367] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 1402.847162] tls_push_sg+0x1e1/0x660 08:42:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2}, 0xa) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1402.847182] tls_push_record+0xa4a/0x1210 [ 1402.847203] tls_sw_sendmsg+0x9e8/0x1020 [ 1402.864287] ? selinux_tun_dev_create+0xc0/0xc0 [ 1402.868983] ? alloc_encrypted_sg+0x100/0x100 [ 1402.873492] ? __fget+0x237/0x370 [ 1402.876959] inet_sendmsg+0x122/0x500 [ 1402.880865] ? inet_recvmsg+0x500/0x500 [ 1402.885015] sock_sendmsg+0xce/0x110 [ 1402.888812] SYSC_sendto+0x206/0x310 [ 1402.892524] ? SYSC_connect+0x2d0/0x2d0 [ 1402.896527] ? lock_downgrade+0x6e0/0x6e0 [ 1402.900681] ? wait_for_completion+0x420/0x420 [ 1402.905489] ? __sb_end_write+0xc1/0x100 [ 1402.909595] ? fput+0xd4/0x150 [ 1402.912802] ? SyS_write+0x15e/0x230 [ 1402.916511] SyS_sendto+0x40/0x50 [ 1402.919960] ? SyS_getpeername+0x30/0x30 [ 1402.924030] do_syscall_64+0x1e8/0x640 [ 1402.927910] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1402.932752] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1402.938020] RIP: 0033:0x459829 [ 1402.941201] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 08:42:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:36 executing program 2 (fault-call:7 fault-nth:15): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1402.948894] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1402.957572] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1402.964829] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1402.972095] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1402.979454] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1403.067481] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1403.081341] FAULT_INJECTION: forcing a failure. [ 1403.081341] name failslab, interval 1, probability 0, space 0, times 0 [ 1403.093496] CPU: 0 PID: 27340 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1403.100626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1403.109992] Call Trace: [ 1403.112619] dump_stack+0x138/0x19c [ 1403.116262] should_fail.cold+0x10f/0x159 [ 1403.120441] should_failslab+0xdb/0x130 [ 1403.124433] kmem_cache_alloc_node_trace+0x280/0x770 [ 1403.129576] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1403.135026] __kmalloc_node_track_caller+0x3d/0x80 [ 1403.139947] __kmalloc_reserve.isra.0+0x40/0xe0 [ 1403.144607] __alloc_skb+0xcf/0x500 [ 1403.148217] ? skb_scrub_packet+0x4b0/0x4b0 [ 1403.152548] sk_stream_alloc_skb+0xb3/0x780 [ 1403.156857] ? ipv6_frag_exit+0x40/0x40 [ 1403.160912] do_tcp_sendpages+0x7d5/0x17d0 [ 1403.165140] ? sk_stream_alloc_skb+0x780/0x780 [ 1403.169707] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 1403.174884] tls_push_sg+0x1e1/0x660 [ 1403.178606] tls_push_record+0xa4a/0x1210 [ 1403.182759] tls_sw_sendmsg+0x9e8/0x1020 [ 1403.186812] ? selinux_tun_dev_create+0xc0/0xc0 [ 1403.191471] ? alloc_encrypted_sg+0x100/0x100 [ 1403.196388] ? __fget+0x237/0x370 [ 1403.199833] inet_sendmsg+0x122/0x500 [ 1403.203624] ? inet_recvmsg+0x500/0x500 [ 1403.207584] sock_sendmsg+0xce/0x110 [ 1403.211283] SYSC_sendto+0x206/0x310 [ 1403.214979] ? SYSC_connect+0x2d0/0x2d0 [ 1403.218939] ? lock_downgrade+0x6e0/0x6e0 [ 1403.223085] ? wait_for_completion+0x420/0x420 [ 1403.227653] ? __sb_end_write+0xc1/0x100 [ 1403.231707] ? fput+0xd4/0x150 [ 1403.234884] ? SyS_write+0x15e/0x230 [ 1403.238598] SyS_sendto+0x40/0x50 [ 1403.242127] ? SyS_getpeername+0x30/0x30 [ 1403.246264] do_syscall_64+0x1e8/0x640 [ 1403.250143] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1403.254975] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1403.260147] RIP: 0033:0x459829 [ 1403.263318] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1403.271010] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1403.278263] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1403.285530] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1403.292797] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1403.300053] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, 0xffffffffffffffff, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x4a9, 0x80000) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0xfffffffffffffe66) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:36 executing program 2 (fault-call:7 fault-nth:16): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1403.402215] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1403.406285] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1403.418157] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1403.438653] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1403.442802] FAULT_INJECTION: forcing a failure. [ 1403.442802] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1403.477337] CPU: 1 PID: 27352 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1403.484480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1403.484485] Call Trace: [ 1403.484503] dump_stack+0x138/0x19c [ 1403.484520] should_fail.cold+0x10f/0x159 [ 1403.484541] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1403.484554] ? lock_downgrade+0x6e0/0x6e0 [ 1403.484574] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1403.484590] ? check_preemption_disabled+0x3c/0x250 [ 1403.484603] alloc_pages_current+0xec/0x1e0 [ 1403.484611] ? quarantine_put+0xfa/0x1a0 [ 1403.484626] skb_page_frag_refill+0x1d3/0x3e0 [ 1403.484633] ? trace_hardirqs_on_caller+0x400/0x590 [ 1403.484645] sk_page_frag_refill+0x53/0x1c0 [ 1403.509359] alloc_sg+0x127/0x6e0 08:42:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x220480, 0x0) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000001180)={&(0x7f0000000100), &(0x7f0000000180)=""/4096, 0x1000}) dup3(r0, r1, 0x0) [ 1403.509379] alloc_encrypted_sg+0x8a/0x100 [ 1403.509392] ? ipv6_frag_exit+0x40/0x40 [ 1403.524209] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1403.528236] tls_sw_sendmsg+0x902/0x1020 [ 1403.528259] ? selinux_tun_dev_create+0xc0/0xc0 [ 1403.528275] ? alloc_encrypted_sg+0x100/0x100 [ 1403.528287] ? __fget+0x237/0x370 [ 1403.584747] inet_sendmsg+0x122/0x500 [ 1403.588558] ? inet_recvmsg+0x500/0x500 [ 1403.592537] sock_sendmsg+0xce/0x110 [ 1403.596357] SYSC_sendto+0x206/0x310 [ 1403.596422] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1403.600079] ? SYSC_connect+0x2d0/0x2d0 [ 1403.600096] ? lock_downgrade+0x6e0/0x6e0 [ 1403.600122] ? wait_for_completion+0x420/0x420 [ 1403.600135] ? __sb_end_write+0xc1/0x100 [ 1403.600146] ? fput+0xd4/0x150 [ 1403.600156] ? SyS_write+0x15e/0x230 [ 1403.600168] SyS_sendto+0x40/0x50 [ 1403.637657] ? SyS_getpeername+0x30/0x30 [ 1403.641714] do_syscall_64+0x1e8/0x640 [ 1403.645590] ? trace_hardirqs_off_thunk+0x1a/0x1c 08:42:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1403.650436] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1403.655613] RIP: 0033:0x459829 [ 1403.658787] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1403.666488] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1403.673756] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1403.681020] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1403.688292] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1403.695571] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0xc4940, 0x0) ioctl$sock_ax25_SIOCDELRT(r2, 0x890c, &(0x7f0000000200)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) ioctl$sock_ax25_SIOCDELRT(r2, 0x890c, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) dup3(r0, r1, 0x0) 08:42:37 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000100), &(0x7f0000000180)=0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x1a) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r2, r1, 0x800000000000000) [ 1403.724185] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000100)={0x9, 0x0, 0x4, 0x1000, 0x13, 0x7, 0x401, 0x6a181cca, 0x3, 0x7, 0x5, 0xd74}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:37 executing program 2 (fault-call:7 fault-nth:17): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1403.837543] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1403.873897] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1403.916522] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1403.929345] FAULT_INJECTION: forcing a failure. [ 1403.929345] name failslab, interval 1, probability 0, space 0, times 0 [ 1403.956816] CPU: 1 PID: 27380 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1403.964057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1403.973603] Call Trace: [ 1403.976217] dump_stack+0x138/0x19c [ 1403.979839] should_fail.cold+0x10f/0x159 [ 1403.983981] should_failslab+0xdb/0x130 [ 1403.987945] __kmalloc+0x2f0/0x7a0 [ 1403.991485] ? trace_hardirqs_on_caller+0x400/0x590 [ 1403.996486] ? tls_push_record+0x10a/0x1210 [ 1404.000792] tls_push_record+0x10a/0x1210 [ 1404.004947] tls_sw_sendmsg+0x9e8/0x1020 [ 1404.009001] ? selinux_tun_dev_create+0xc0/0xc0 [ 1404.013657] ? alloc_encrypted_sg+0x100/0x100 [ 1404.018139] ? __fget+0x237/0x370 [ 1404.021669] inet_sendmsg+0x122/0x500 [ 1404.025452] ? inet_recvmsg+0x500/0x500 [ 1404.029410] sock_sendmsg+0xce/0x110 [ 1404.033109] SYSC_sendto+0x206/0x310 [ 1404.036808] ? SYSC_connect+0x2d0/0x2d0 [ 1404.040768] ? lock_downgrade+0x6e0/0x6e0 [ 1404.044917] ? wait_for_completion+0x420/0x420 [ 1404.049486] ? __sb_end_write+0xc1/0x100 [ 1404.053623] ? fput+0xd4/0x150 [ 1404.056798] ? SyS_write+0x15e/0x230 [ 1404.060500] SyS_sendto+0x40/0x50 [ 1404.063938] ? SyS_getpeername+0x30/0x30 [ 1404.067988] do_syscall_64+0x1e8/0x640 [ 1404.071861] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1404.076690] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1404.081878] RIP: 0033:0x459829 [ 1404.085049] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1404.092842] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1404.100187] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 08:42:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r0, 0x80000) sendto$rose(r2, &(0x7f0000000180)="59a7f83cd23ced9e16595f2a378802e52968438af6e37c3d132a0e39eb23f97480a1cb1f3822f2d1ee1cdda72155145859e55ae7bbcdbc2e0f0b948061c0156c21931d89a957adf27429ad1312d263bb9b8bf46ef414b551cb2c4ea32bb8d2160a2aecc07b97b3a5b72b7f52750244d483ab1978749c14f210dab7045891342832c2918c203e374ba10feb9e8e156bd7a3854b38ba7e775934277bb7531eedeb5aab7334772d2b029c0c25f43b2f51397cedd1b6b11761fca05908eac15586cc45c3604f91c21fd0da", 0xc9, 0x40, &(0x7f0000000040)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, 0x2, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x40) [ 1404.107440] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1404.114692] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1404.121944] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, 0xffffffffffffffff, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:37 executing program 2 (fault-call:7 fault-nth:18): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000080)=0x1, &(0x7f0000000100)=0x4) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000180)={0x925f, 0x3ff, 0x100000001}) 08:42:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1404.252222] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1404.255018] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1404.281259] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1404.320094] FAULT_INJECTION: forcing a failure. [ 1404.320094] name failslab, interval 1, probability 0, space 0, times 0 [ 1404.336034] CPU: 0 PID: 27404 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1404.343433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1404.351543] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1404.352917] Call Trace: [ 1404.352937] dump_stack+0x138/0x19c [ 1404.352958] should_fail.cold+0x10f/0x159 [ 1404.352975] should_failslab+0xdb/0x130 [ 1404.352995] __kmalloc+0x71/0x7a0 [ 1404.353014] ? gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1404.386309] gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1404.391349] ? __lock_is_held+0xb6/0x140 [ 1404.395430] ? check_preemption_disabled+0x3c/0x250 [ 1404.400469] generic_gcmaes_encrypt+0xf4/0x130 [ 1404.405072] ? helper_rfc4106_encrypt+0x320/0x320 [ 1404.409925] ? __kmalloc+0x376/0x7a0 [ 1404.413654] gcmaes_wrapper_encrypt+0xef/0x150 08:42:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x6, 0x300) ioctl$UI_SET_MSCBIT(r2, 0x40045568, 0x25) dup3(r0, r1, 0x0) [ 1404.418296] tls_push_record+0x906/0x1210 [ 1404.422475] tls_sw_sendmsg+0x9e8/0x1020 [ 1404.422494] ? selinux_tun_dev_create+0xc0/0xc0 [ 1404.431318] ? alloc_encrypted_sg+0x100/0x100 [ 1404.431331] ? __fget+0x237/0x370 [ 1404.431350] inet_sendmsg+0x122/0x500 [ 1404.431361] ? inet_recvmsg+0x500/0x500 [ 1404.431373] sock_sendmsg+0xce/0x110 [ 1404.431383] SYSC_sendto+0x206/0x310 [ 1404.431391] ? SYSC_connect+0x2d0/0x2d0 [ 1404.431403] ? lock_downgrade+0x6e0/0x6e0 [ 1404.431427] ? wait_for_completion+0x420/0x420 08:42:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1404.431439] ? __sb_end_write+0xc1/0x100 [ 1404.431452] ? fput+0xd4/0x150 [ 1404.431461] ? SyS_write+0x15e/0x230 [ 1404.431472] SyS_sendto+0x40/0x50 [ 1404.481729] ? SyS_getpeername+0x30/0x30 [ 1404.485807] do_syscall_64+0x1e8/0x640 [ 1404.489761] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1404.494623] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1404.499824] RIP: 0033:0x459829 [ 1404.500880] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:37 executing program 2 (fault-call:7 fault-nth:19): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1404.503021] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1404.503034] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1404.503041] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1404.503047] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1404.503053] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1404.503059] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1404.594229] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1404.602749] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1404.611211] FAULT_INJECTION: forcing a failure. [ 1404.611211] name failslab, interval 1, probability 0, space 0, times 0 [ 1404.633496] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1404.663642] CPU: 0 PID: 27418 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1404.671021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1404.680385] Call Trace: [ 1404.682986] dump_stack+0x138/0x19c [ 1404.686613] should_fail.cold+0x10f/0x159 [ 1404.690779] should_failslab+0xdb/0x130 [ 1404.694879] kmem_cache_alloc_node+0x287/0x780 [ 1404.694895] ? tcp_write_xmit+0xa48/0x48b0 [ 1404.694913] __alloc_skb+0x9c/0x500 [ 1404.694924] ? skb_scrub_packet+0x4b0/0x4b0 08:42:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/enforce\x00', 0x2000, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f0000000400)={0x3a, 0x3069, 0xc, 0x8, 0xdb, 0x81}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000180), r3, 0x800}}, 0x18) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000300)='tls\x00', 0x4) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000380)={0x7}, 0x4) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) syz_open_procfs(r5, &(0x7f00000002c0)='net/rt6_stats\x00') dup3(r0, r2, 0x0) [ 1404.703729] sk_stream_alloc_skb+0xb3/0x780 [ 1404.703743] ? ipv6_frag_exit+0x40/0x40 [ 1404.703755] do_tcp_sendpages+0x7d5/0x17d0 [ 1404.703774] ? sk_stream_alloc_skb+0x780/0x780 [ 1404.728821] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 1404.734035] tls_push_sg+0x1e1/0x660 [ 1404.737774] tls_push_record+0xa4a/0x1210 [ 1404.741946] tls_sw_sendmsg+0x9e8/0x1020 [ 1404.746029] ? selinux_tun_dev_create+0xc0/0xc0 [ 1404.750717] ? alloc_encrypted_sg+0x100/0x100 [ 1404.755260] ? __fget+0x237/0x370 [ 1404.758737] inet_sendmsg+0x122/0x500 08:42:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000180)) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r0, r1, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20, 0x79da, @mcast1, 0x3}, 0x1c) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000080)={r3, 0xffffffffffffff57, 0xff, r3}) open$dir(&(0x7f0000000200)='./file0\x00', 0x40, 0x90) 08:42:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0xc498ead121f97e4c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x228000, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) dup3(r0, r1, 0x0) 08:42:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1404.762545] ? inet_recvmsg+0x500/0x500 [ 1404.769560] sock_sendmsg+0xce/0x110 [ 1404.769572] SYSC_sendto+0x206/0x310 [ 1404.769581] ? SYSC_connect+0x2d0/0x2d0 [ 1404.769596] ? lock_downgrade+0x6e0/0x6e0 [ 1404.786612] ? wait_for_completion+0x420/0x420 [ 1404.786629] ? __sb_end_write+0xc1/0x100 [ 1404.786643] ? fput+0xd4/0x150 [ 1404.786655] ? SyS_write+0x15e/0x230 [ 1404.802179] SyS_sendto+0x40/0x50 [ 1404.805647] ? SyS_getpeername+0x30/0x30 [ 1404.809721] do_syscall_64+0x1e8/0x640 08:42:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x820004004, &(0x7f0000000040)={0xa, 0x4e22, 0x3, @loopback, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000180)={0xfffffffffffffffb, 0x2, 'client0\x00', 0x4, "d7514421be448685", "d0362ac3a908e31ba488756de30b247efa3de66b28ea853ce161d760af6a6788", 0x2, 0x1ff}) [ 1404.813611] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1404.818467] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1404.823660] RIP: 0033:0x459829 [ 1404.826942] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1404.834648] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1404.834654] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1404.834659] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1404.834664] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1404.834669] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1404.871439] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) write$capi20(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r0, 0xfffffffffffffffd) 08:42:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:38 executing program 2 (fault-call:7 fault-nth:20): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) splice(r0, &(0x7f0000000080), r0, &(0x7f0000000100), 0x8, 0xe) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1405.075901] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1405.076943] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1405.090516] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1405.112886] FAULT_INJECTION: forcing a failure. [ 1405.112886] name failslab, interval 1, probability 0, space 0, times 0 [ 1405.136615] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1405.142914] CPU: 1 PID: 27454 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1405.154091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1405.163462] Call Trace: [ 1405.166076] dump_stack+0x138/0x19c [ 1405.169734] should_fail.cold+0x10f/0x159 [ 1405.173995] should_failslab+0xdb/0x130 [ 1405.177983] __kmalloc+0x71/0x7a0 [ 1405.181438] ? gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1405.186627] gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1405.191631] ? __lock_is_held+0xb6/0x140 [ 1405.195677] ? check_preemption_disabled+0x3c/0x250 [ 1405.200682] generic_gcmaes_encrypt+0xf4/0x130 [ 1405.205246] ? helper_rfc4106_encrypt+0x320/0x320 [ 1405.210120] ? __kmalloc+0x376/0x7a0 [ 1405.213821] gcmaes_wrapper_encrypt+0xef/0x150 [ 1405.218388] tls_push_record+0x906/0x1210 [ 1405.222527] tls_sw_sendmsg+0x9e8/0x1020 [ 1405.226581] ? selinux_tun_dev_create+0xc0/0xc0 [ 1405.231261] ? alloc_encrypted_sg+0x100/0x100 [ 1405.235744] ? __fget+0x237/0x370 [ 1405.239187] inet_sendmsg+0x122/0x500 [ 1405.242979] ? inet_recvmsg+0x500/0x500 [ 1405.246948] sock_sendmsg+0xce/0x110 [ 1405.250649] SYSC_sendto+0x206/0x310 [ 1405.254349] ? SYSC_connect+0x2d0/0x2d0 [ 1405.258327] ? lock_downgrade+0x6e0/0x6e0 [ 1405.262473] ? wait_for_completion+0x420/0x420 [ 1405.267054] ? __sb_end_write+0xc1/0x100 [ 1405.271108] ? fput+0xd4/0x150 [ 1405.274369] ? SyS_write+0x15e/0x230 [ 1405.278092] SyS_sendto+0x40/0x50 [ 1405.281531] ? SyS_getpeername+0x30/0x30 [ 1405.285579] do_syscall_64+0x1e8/0x640 [ 1405.289457] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1405.294286] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1405.299462] RIP: 0033:0x459829 [ 1405.302641] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1405.310425] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1405.317678] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1405.325193] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 08:42:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1405.332450] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1405.339802] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) write$capi20(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) [ 1405.396161] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f0000000080)) [ 1405.449775] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) syz_mount_image$bfs(&(0x7f0000000080)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="12ff06596d9b47ed51ef35943572e8eb79459d954e3e6c212df5bc6f86ef48001599cf8faf97f622589ac4c208592c9f2fc1e8bb999772971cd223f9de1af81f130fa1686a5dd9984748772e1e0896883a7e6bf2a3e1a0b944a611f5b993f413c32b2f2a988003d246a1141b43aeea97d50ccd8f7b66c080b1b14ebb15c34979c851abc8cc33c100259f1a80e7a37d9b48072edd1b865e583bd5d80d778fe78f7e3fc4f067a2033a01a95bfdd90065b3ab11223245027718e0490b536c141af8956acb8b0b282c60a383fecc2b4ed0118018f8556690a5a88a0469d940bb61c15c5ec56eae", 0xe5, 0x2}, {&(0x7f0000000280)="83953512252aec551ad73a467a5614a9c6718e9602e14749806ba3c5cb5cfc7933a68dafc1b26b0de7d1b6b70a8ed1eee8c15661695bba05d236d0be331a5ded62a09a440986550168f5c9b8bf166620ef0b05ac305e4e6486d5efd32ec187afb007c8f87b49d4942496ce65d6de5dc5c04e21b2be0b66efdd6d9f5c97df9503f912f6d43f8cec9244021a3ff13e1b5e47f19c211e749d9b235f27c86539b05d25e0996c0f2462193175952f3a778e7e5e889a49674e0776f83a49ec59104783a3e5493797bb8bfebc768d632ff36c95826fe7faacfc33b3e7ebbc7da7360ed103c51f71032417c74f3eed5dfb3be8cc1ac732fe99e62fade5baf5", 0xfb, 0x3}, {&(0x7f0000000380)="50f6f487594c07bf07", 0x9, 0x100000000}], 0x8010, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:38 executing program 2 (fault-call:7 fault-nth:21): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) write$capi20(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x8, 0x0, 0x83, 0x7, 0x5}, 0x10) 08:42:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x10, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) bind(r1, &(0x7f0000000180)=@sco={0x1f, {0xf4, 0x7, 0x1, 0x3, 0x7ff, 0x8}}, 0x80) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1405.681003] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1405.686631] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1405.705985] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1405.719875] FAULT_INJECTION: forcing a failure. [ 1405.719875] name failslab, interval 1, probability 0, space 0, times 0 [ 1405.738190] CPU: 1 PID: 27486 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1405.745335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1405.754706] Call Trace: [ 1405.757307] dump_stack+0x138/0x19c [ 1405.760968] should_fail.cold+0x10f/0x159 [ 1405.765134] should_failslab+0xdb/0x130 [ 1405.769130] __kmalloc+0x2f0/0x7a0 [ 1405.772678] ? tls_push_record+0xc03/0x1210 [ 1405.777004] ? trace_hardirqs_on_caller+0x400/0x590 [ 1405.782033] ? tls_push_record+0x10a/0x1210 [ 1405.786407] tls_push_record+0x10a/0x1210 [ 1405.790773] tls_sw_sendmsg+0x9e8/0x1020 [ 1405.794884] ? selinux_tun_dev_create+0xc0/0xc0 [ 1405.799666] ? alloc_encrypted_sg+0x100/0x100 [ 1405.804174] ? __fget+0x237/0x370 [ 1405.807645] inet_sendmsg+0x122/0x500 [ 1405.811548] ? inet_recvmsg+0x500/0x500 [ 1405.815550] sock_sendmsg+0xce/0x110 [ 1405.819266] SYSC_sendto+0x206/0x310 [ 1405.822987] ? SYSC_connect+0x2d0/0x2d0 [ 1405.826999] ? lock_downgrade+0x6e0/0x6e0 [ 1405.831142] ? wait_for_completion+0x420/0x420 [ 1405.836302] ? __sb_end_write+0xc1/0x100 [ 1405.840348] ? fput+0xd4/0x150 [ 1405.843538] ? SyS_write+0x15e/0x230 [ 1405.847338] SyS_sendto+0x40/0x50 [ 1405.850778] ? SyS_getpeername+0x30/0x30 [ 1405.854826] do_syscall_64+0x1e8/0x640 [ 1405.858705] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1405.863542] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1405.868717] RIP: 0033:0x459829 [ 1405.871886] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1405.883734] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1405.891007] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1405.898262] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1405.905514] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1405.912769] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1405.928998] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = dup2(r1, r0) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r2, r2, 0x80000) 08:42:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, 0x0, 0x0) 08:42:39 executing program 2 (fault-call:7 fault-nth:22): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1405.985611] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x408241, 0x0) syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x9e, 0x90000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in=@broadcast, @in6=@empty}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(0xffffffffffffffff, r0, 0x0) 08:42:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000180)={0x2, 0xbde, 0x41, 'queue0\x00', 0x8}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1406.065729] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1406.077239] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1406.104279] FAULT_INJECTION: forcing a failure. [ 1406.104279] name failslab, interval 1, probability 0, space 0, times 0 [ 1406.149363] CPU: 1 PID: 27511 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1406.156519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1406.165885] Call Trace: [ 1406.168485] dump_stack+0x138/0x19c [ 1406.172103] should_fail.cold+0x10f/0x159 [ 1406.176245] should_failslab+0xdb/0x130 [ 1406.180205] __kmalloc+0x71/0x7a0 [ 1406.183654] ? gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1406.188939] gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1406.193945] ? __lock_is_held+0xb6/0x140 [ 1406.198004] ? check_preemption_disabled+0x3c/0x250 [ 1406.203023] generic_gcmaes_encrypt+0xf4/0x130 [ 1406.207590] ? helper_rfc4106_encrypt+0x320/0x320 [ 1406.212415] ? __kmalloc+0x376/0x7a0 [ 1406.216117] gcmaes_wrapper_encrypt+0xef/0x150 [ 1406.220686] tls_push_record+0x906/0x1210 [ 1406.224828] tls_sw_sendmsg+0x9e8/0x1020 [ 1406.228881] ? selinux_tun_dev_create+0xc0/0xc0 [ 1406.233542] ? alloc_encrypted_sg+0x100/0x100 [ 1406.238019] ? __fget+0x237/0x370 [ 1406.241463] inet_sendmsg+0x122/0x500 [ 1406.245248] ? inet_recvmsg+0x500/0x500 [ 1406.249207] sock_sendmsg+0xce/0x110 [ 1406.252921] SYSC_sendto+0x206/0x310 [ 1406.256620] ? SYSC_connect+0x2d0/0x2d0 [ 1406.260579] ? lock_downgrade+0x6e0/0x6e0 [ 1406.264748] ? wait_for_completion+0x420/0x420 [ 1406.269320] ? __sb_end_write+0xc1/0x100 [ 1406.273368] ? fput+0xd4/0x150 [ 1406.276550] ? SyS_write+0x15e/0x230 [ 1406.280249] SyS_sendto+0x40/0x50 [ 1406.283794] ? SyS_getpeername+0x30/0x30 [ 1406.287848] do_syscall_64+0x1e8/0x640 [ 1406.291761] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1406.296599] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1406.301776] RIP: 0033:0x459829 [ 1406.304948] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1406.313005] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1406.320260] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1406.327535] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1406.334793] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1406.342132] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) write$capi20(r2, 0x0, 0x0) [ 1406.349648] net_ratelimit: 22 callbacks suppressed [ 1406.349653] protocol 88fb is buggy, dev hsr_slave_0 [ 1406.359721] protocol 88fb is buggy, dev hsr_slave_1 [ 1406.376220] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1406.466245] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1406.468898] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:39 executing program 2 (fault-call:7 fault-nth:23): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000100)={0x5, &(0x7f0000000180)=[{}, {}, {}, {}, {}]}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r2, 0x0) 08:42:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x4, 0x0, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000080)={0x3, 0x1}) dup3(r0, r1, 0x0) userfaultfd(0x80800) 08:42:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x10000, 0x204040) ioctl$RTC_PIE_ON(r2, 0x7005) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1406.612161] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1406.613467] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1406.627012] FAULT_INJECTION: forcing a failure. [ 1406.627012] name failslab, interval 1, probability 0, space 0, times 0 [ 1406.647284] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1406.652574] CPU: 0 PID: 27542 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1406.664838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1406.674280] Call Trace: [ 1406.676869] dump_stack+0x138/0x19c [ 1406.680481] should_fail.cold+0x10f/0x159 [ 1406.684622] should_failslab+0xdb/0x130 [ 1406.688584] kmem_cache_alloc_node+0x287/0x780 [ 1406.693148] ? tcp_established_options+0x2c5/0x420 [ 1406.698065] __alloc_skb+0x9c/0x500 [ 1406.701678] ? skb_scrub_packet+0x4b0/0x4b0 [ 1406.706080] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1406.711170] sk_stream_alloc_skb+0xb3/0x780 [ 1406.715472] ? __sk_mem_schedule+0xa1/0xd0 [ 1406.719696] ? ipv6_frag_exit+0x40/0x40 [ 1406.723672] do_tcp_sendpages+0x7d5/0x17d0 [ 1406.727898] ? sk_stream_alloc_skb+0x780/0x780 [ 1406.732472] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 1406.737995] tls_push_sg+0x1e1/0x660 [ 1406.741784] tls_push_record+0xa4a/0x1210 [ 1406.746101] tls_sw_sendmsg+0x9e8/0x1020 [ 1406.750328] ? selinux_tun_dev_create+0xc0/0xc0 [ 1406.755074] ? alloc_encrypted_sg+0x100/0x100 [ 1406.759558] ? __fget+0x237/0x370 [ 1406.763013] inet_sendmsg+0x122/0x500 [ 1406.766804] ? inet_recvmsg+0x500/0x500 [ 1406.770766] sock_sendmsg+0xce/0x110 [ 1406.774468] SYSC_sendto+0x206/0x310 [ 1406.778349] ? SYSC_connect+0x2d0/0x2d0 [ 1406.782501] ? lock_downgrade+0x6e0/0x6e0 [ 1406.788186] ? wait_for_completion+0x420/0x420 [ 1406.790193] protocol 88fb is buggy, dev hsr_slave_0 [ 1406.792768] ? __sb_end_write+0xc1/0x100 [ 1406.797827] protocol 88fb is buggy, dev hsr_slave_1 [ 1406.801813] ? fput+0xd4/0x150 [ 1406.801822] ? SyS_write+0x15e/0x230 [ 1406.801836] SyS_sendto+0x40/0x50 [ 1406.801843] ? SyS_getpeername+0x30/0x30 [ 1406.801858] do_syscall_64+0x1e8/0x640 [ 1406.801865] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1406.801880] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1406.835429] RIP: 0033:0x459829 [ 1406.838610] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1406.846479] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1406.853744] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1406.861178] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1406.868950] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1406.876201] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = accept4(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, &(0x7f0000000200)=0x80, 0x80000) ioctl$SIOCX25GDTEFACILITIES(r2, 0x89ea, &(0x7f0000000240)) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x11) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f0000000100)={0xf12, 0xfffffffffffffff9}) 08:42:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:40 executing program 2 (fault-call:7 fault-nth:24): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1406.984699] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1407.008256] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x4, 0x0) setsockopt$inet_dccp_buf(r2, 0x21, 0x82, &(0x7f0000000100)="5eae71c9dfe6860a02772cf49b05087fc0", 0x11) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1407.065967] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1407.106084] FAULT_INJECTION: forcing a failure. [ 1407.106084] name failslab, interval 1, probability 0, space 0, times 0 [ 1407.119322] protocol 88fb is buggy, dev hsr_slave_0 [ 1407.119400] protocol 88fb is buggy, dev hsr_slave_1 [ 1407.119496] protocol 88fb is buggy, dev hsr_slave_0 [ 1407.119536] protocol 88fb is buggy, dev hsr_slave_1 [ 1407.138696] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1407.154211] CPU: 0 PID: 27571 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1407.161469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1407.170920] Call Trace: [ 1407.173526] dump_stack+0x138/0x19c [ 1407.177171] should_fail.cold+0x10f/0x159 [ 1407.181450] should_failslab+0xdb/0x130 [ 1407.185453] kmem_cache_alloc_node_trace+0x280/0x770 [ 1407.190589] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1407.196065] __kmalloc_node_track_caller+0x3d/0x80 [ 1407.201184] __kmalloc_reserve.isra.0+0x40/0xe0 [ 1407.205873] __alloc_skb+0xcf/0x500 [ 1407.209515] ? skb_scrub_packet+0x4b0/0x4b0 [ 1407.213852] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1407.218965] sk_stream_alloc_skb+0xb3/0x780 [ 1407.223305] ? __sk_mem_schedule+0xa1/0xd0 [ 1407.227559] ? ipv6_frag_exit+0x40/0x40 [ 1407.231556] do_tcp_sendpages+0x7d5/0x17d0 [ 1407.235894] ? sk_stream_alloc_skb+0x780/0x780 [ 1407.240484] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 1407.245679] tls_push_sg+0x1e1/0x660 [ 1407.249388] tls_push_record+0xa4a/0x1210 [ 1407.253534] tls_sw_sendmsg+0x9e8/0x1020 [ 1407.257592] ? selinux_tun_dev_create+0xc0/0xc0 [ 1407.262274] ? alloc_encrypted_sg+0x100/0x100 [ 1407.266761] ? __fget+0x237/0x370 [ 1407.270200] inet_sendmsg+0x122/0x500 [ 1407.273997] ? inet_recvmsg+0x500/0x500 [ 1407.277957] sock_sendmsg+0xce/0x110 [ 1407.281831] SYSC_sendto+0x206/0x310 [ 1407.285535] ? SYSC_connect+0x2d0/0x2d0 [ 1407.289500] ? lock_downgrade+0x6e0/0x6e0 [ 1407.293644] ? wait_for_completion+0x420/0x420 [ 1407.298212] ? __sb_end_write+0xc1/0x100 [ 1407.302261] ? fput+0xd4/0x150 [ 1407.305452] ? SyS_write+0x15e/0x230 [ 1407.309157] SyS_sendto+0x40/0x50 [ 1407.312603] ? SyS_getpeername+0x30/0x30 [ 1407.316657] do_syscall_64+0x1e8/0x640 [ 1407.320530] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1407.325362] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1407.330536] RIP: 0033:0x459829 [ 1407.333708] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1407.341412] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1407.348676] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 08:42:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1407.355930] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1407.363184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1407.370444] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:40 executing program 2 (fault-call:7 fault-nth:25): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1407.444441] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1407.459529] FAULT_INJECTION: forcing a failure. [ 1407.459529] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1407.477397] CPU: 0 PID: 27590 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1407.484567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1407.493933] Call Trace: [ 1407.496532] dump_stack+0x138/0x19c [ 1407.500154] should_fail.cold+0x10f/0x159 [ 1407.500174] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1407.500186] ? lock_downgrade+0x6e0/0x6e0 [ 1407.500198] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1407.500213] ? check_preemption_disabled+0x3c/0x250 [ 1407.500226] alloc_pages_current+0xec/0x1e0 [ 1407.510139] protocol 88fb is buggy, dev hsr_slave_0 [ 1407.513187] ? quarantine_put+0xfa/0x1a0 [ 1407.518222] protocol 88fb is buggy, dev hsr_slave_1 [ 1407.523265] skb_page_frag_refill+0x1d3/0x3e0 [ 1407.523278] ? trace_hardirqs_on_caller+0x400/0x590 [ 1407.523288] sk_page_frag_refill+0x53/0x1c0 [ 1407.523302] alloc_sg+0x127/0x6e0 [ 1407.523319] alloc_encrypted_sg+0x8a/0x100 [ 1407.563066] ? ipv6_frag_exit+0x40/0x40 [ 1407.567029] tls_sw_sendmsg+0x902/0x1020 [ 1407.571093] ? selinux_tun_dev_create+0xc0/0xc0 [ 1407.575757] ? alloc_encrypted_sg+0x100/0x100 [ 1407.580257] ? __fget+0x237/0x370 [ 1407.583698] inet_sendmsg+0x122/0x500 [ 1407.587483] ? inet_recvmsg+0x500/0x500 [ 1407.591620] sock_sendmsg+0xce/0x110 [ 1407.595324] SYSC_sendto+0x206/0x310 [ 1407.599018] ? SYSC_connect+0x2d0/0x2d0 [ 1407.602976] ? lock_downgrade+0x6e0/0x6e0 [ 1407.607117] ? wait_for_completion+0x420/0x420 [ 1407.611682] ? __sb_end_write+0xc1/0x100 [ 1407.615733] ? fput+0xd4/0x150 [ 1407.618909] ? SyS_write+0x15e/0x230 [ 1407.622606] SyS_sendto+0x40/0x50 [ 1407.626041] ? SyS_getpeername+0x30/0x30 [ 1407.630088] do_syscall_64+0x1e8/0x640 [ 1407.634056] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1407.638888] entry_SYSCALL_64_after_hwframe+0x42/0xb7 08:42:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0xfffffffffffffffa}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1407.644148] RIP: 0033:0x459829 [ 1407.647318] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1407.655010] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1407.662359] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1407.669706] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1407.676960] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1407.684216] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x400, 0x0) fsync(r2) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x2000000004e33, @empty}, 0xa) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000100)=0x78) 08:42:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x4, 0x0) setsockopt$inet_dccp_buf(r2, 0x21, 0x82, &(0x7f0000000100)="5eae71c9dfe6860a02772cf49b05087fc0", 0x11) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1407.707679] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:41 executing program 2 (fault-call:7 fault-nth:26): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1407.804319] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1407.843295] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0xffffffffffffffc9, 0x400) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000500)=0x9, 0x4) r2 = request_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000180)='tls\x00', 0xfffffffffffffffd) r3 = syz_open_dev$amidi(&(0x7f0000000540)='/dev/amidi#\x00', 0x2400000, 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000580)=[@in6={0xa, 0x4e22, 0x0, @rand_addr="56e071740502bef62eb8d6aa3d45e164", 0x2}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e20, @rand_addr=0x5}, @in={0x2, 0x4e20, @rand_addr=0x8b}, @in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2b}}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0xac) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000001c0)={r2, 0xea, 0xf0}, &(0x7f0000000200)={'enc=', 'pkcs1', ' hash=', {'sha256-avx\x00'}}, &(0x7f0000000280)="694b7253e961c1dc14f3f3b8ff20dd3e189cc6d4ed72b8af2740248f0cd9231840b025bb4429b92d87bdcfeaac615b053d8b5567fb4b9d3ff43fa9c6d8e23497200e8cdbb2f6c1e7223d0358d4fc24b883fecf60fa6a2b27ba0bb12bdd6ffc0a749a3a066c307e1f1258e525aeed01d96a991a9d3c92f216f86f461e54a571060ce8611f4d1eacd08405778bb41e42d1781a4a112181a9e726969789ac1d51032134b6b67ed04c0851c01f970ada9d9c89839058d96265214abac2ce4374c6004443ae70b9584bb2504b5bd90d974a611694a924055ec3bab9d3d9e8819c2cae9b3e0d24947ed9cf485a", &(0x7f0000000380)=""/240) dup3(r0, r1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000480)=ANY=[@ANYBLOB="1608000000000000c20400000007c9100000000d00000000000000000000000000010005020001c910ff0200000400000000000000000105020400"/80], 0x50) [ 1407.943718] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1407.960860] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1407.963314] FAULT_INJECTION: forcing a failure. [ 1407.963314] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1408.000720] CPU: 0 PID: 27621 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1408.007870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1408.012987] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1408.017255] Call Trace: [ 1408.017276] dump_stack+0x138/0x19c [ 1408.017292] should_fail.cold+0x10f/0x159 [ 1408.038164] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1408.042853] ? lock_downgrade+0x6e0/0x6e0 [ 1408.047072] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1408.052128] ? check_preemption_disabled+0x3c/0x250 [ 1408.057168] alloc_pages_current+0xec/0x1e0 [ 1408.061676] ? quarantine_put+0xfa/0x1a0 [ 1408.065768] skb_page_frag_refill+0x1d3/0x3e0 [ 1408.070287] ? trace_hardirqs_on_caller+0x400/0x590 [ 1408.075324] sk_page_frag_refill+0x53/0x1c0 [ 1408.079666] alloc_sg+0x127/0x6e0 [ 1408.083149] alloc_encrypted_sg+0x8a/0x100 [ 1408.087401] ? ipv6_frag_exit+0x40/0x40 [ 1408.090012] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1408.091384] tls_sw_sendmsg+0x902/0x1020 [ 1408.091403] ? selinux_tun_dev_create+0xc0/0xc0 [ 1408.110472] ? alloc_encrypted_sg+0x100/0x100 [ 1408.114973] ? __fget+0x237/0x370 [ 1408.118442] inet_sendmsg+0x122/0x500 [ 1408.122259] ? inet_recvmsg+0x500/0x500 [ 1408.126262] sock_sendmsg+0xce/0x110 [ 1408.129981] SYSC_sendto+0x206/0x310 [ 1408.133704] ? SYSC_connect+0x2d0/0x2d0 [ 1408.137710] ? lock_downgrade+0x6e0/0x6e0 [ 1408.141880] ? wait_for_completion+0x420/0x420 [ 1408.146501] ? __sb_end_write+0xc1/0x100 [ 1408.150573] ? fput+0xd4/0x150 [ 1408.153857] ? SyS_write+0x15e/0x230 [ 1408.157580] SyS_sendto+0x40/0x50 [ 1408.161041] ? SyS_getpeername+0x30/0x30 [ 1408.165103] do_syscall_64+0x1e8/0x640 [ 1408.168975] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1408.173906] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1408.179078] RIP: 0033:0x459829 [ 1408.182307] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1408.190098] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 08:42:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = accept4(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, &(0x7f0000000200)=0x80, 0x80000) ioctl$SIOCX25GDTEFACILITIES(r2, 0x89ea, &(0x7f0000000240)) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x11) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f0000000100)={0xf12, 0xfffffffffffffff9}) 08:42:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@gcm_256={{0x307}, "1f50ca31f89c1ab4", "fd6f5ea2be48960f4cce6061200a38c7ae12bf148fd1c44ed344c1c78f1870e0", "efd6d7da", "4e1ed6e145aaa1e0"}, 0x38) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) [ 1408.197381] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1408.204637] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1408.211897] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1408.219325] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1408.249448] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1408.296749] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1408.306721] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:41 executing program 2 (fault-call:7 fault-nth:27): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x3000)=nil, 0x7000) shmdt(r2) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x10081, 0x0) connect$x25(r3, &(0x7f00000001c0)={0x9, @null=' \x00'}, 0x12) write$P9_RXATTRWALK(r3, &(0x7f0000000100)={0xf, 0x1f, 0x1, 0x10001}, 0xf) r4 = dup3(r0, r1, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000180)={0x4, 0x80000001, 0x7ff, 0x6, 0x1, 0x0, 0x3, 0x1, 0x7, 0x100000001, 0x72d2, 0x81}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x81, @loopback, 0x3}}, 0x1000, 0x4, 0x7e92e641, 0xf07, 0x9}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000300)={0x0, 0x400, 0x100000000, 0x1}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000380)={r5, 0x1, 0x401, 0x9, 0x4a, 0x100000001, 0x100, 0x3f, {r6, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x25}}}, 0x400, 0xeb8c, 0x10001, 0x3, 0x200}}, &(0x7f0000000440)=0xb0) [ 1408.401180] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1408.414737] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1408.420155] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1408.438900] FAULT_INJECTION: forcing a failure. [ 1408.438900] name failslab, interval 1, probability 0, space 0, times 0 [ 1408.471914] CPU: 0 PID: 27642 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1408.479065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1408.479072] Call Trace: [ 1408.479090] dump_stack+0x138/0x19c [ 1408.479107] should_fail.cold+0x10f/0x159 [ 1408.498810] should_failslab+0xdb/0x130 [ 1408.502803] __kmalloc+0x71/0x7a0 [ 1408.506265] ? gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1408.511460] gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1408.511472] ? __lock_is_held+0xb6/0x140 [ 1408.511484] ? check_preemption_disabled+0x3c/0x250 [ 1408.511500] generic_gcmaes_encrypt+0xf4/0x130 [ 1408.511511] ? helper_rfc4106_encrypt+0x320/0x320 [ 1408.511523] ? __kmalloc+0x376/0x7a0 [ 1408.511535] gcmaes_wrapper_encrypt+0xef/0x150 [ 1408.511550] tls_push_record+0x906/0x1210 [ 1408.511571] tls_sw_sendmsg+0x9e8/0x1020 [ 1408.511588] ? selinux_tun_dev_create+0xc0/0xc0 [ 1408.530524] ? alloc_encrypted_sg+0x100/0x100 [ 1408.530538] ? __fget+0x237/0x370 [ 1408.530554] inet_sendmsg+0x122/0x500 [ 1408.530562] ? inet_recvmsg+0x500/0x500 [ 1408.530573] sock_sendmsg+0xce/0x110 [ 1408.530583] SYSC_sendto+0x206/0x310 [ 1408.530594] ? SYSC_connect+0x2d0/0x2d0 [ 1408.530608] ? lock_downgrade+0x6e0/0x6e0 [ 1408.530630] ? wait_for_completion+0x420/0x420 [ 1408.541627] ? __sb_end_write+0xc1/0x100 [ 1408.541642] ? fput+0xd4/0x150 [ 1408.541658] ? SyS_write+0x15e/0x230 [ 1408.541672] SyS_sendto+0x40/0x50 [ 1408.541680] ? SyS_getpeername+0x30/0x30 [ 1408.541695] do_syscall_64+0x1e8/0x640 [ 1408.541703] ? trace_hardirqs_off_thunk+0x1a/0x1c 08:42:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1408.541721] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1408.541729] RIP: 0033:0x459829 [ 1408.541734] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1408.541746] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1408.541751] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1408.541757] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1408.541762] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 08:42:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r3 = add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$assume_authority(0x10, r3) listen(r1, 0x7) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x10c4bb8f0822d7fb) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r4 = dup3(r0, r1, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r4, 0x4010ae94, &(0x7f0000000180)={0x9, 0x5, 0xc80}) 08:42:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x2) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000001180)={0x40, 0x3, 0x80000001, 0x0, 0x3, 0x7, 0x81, 0xa2e, 0x101, 0x9, 0xffffffffffff7640, 0x0, 0xf781, 0x1, &(0x7f0000000180)=""/4096, 0x2, 0x3, 0x8}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x28000, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0xc, &(0x7f0000001200)=0x100000000, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$TIPC_IMPORTANCE(r3, 0x10f, 0x7f, &(0x7f0000001240)=0x2ffd, 0x4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) getpgid(r4) dup3(r0, r2, 0x0) 08:42:41 executing program 2 (fault-call:7 fault-nth:28): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1408.541770] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1408.608445] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in6={{0xa, 0x4e21, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}}, 0x0, 0x6, 0x0, "715179f59c4c305c45c02e5fd6c26c1bedaa10db899af07039390a7ed1056660cdc6b29863a3bf7ab9a4641a59a941032632a53185049f8dbc1957cf9e7ca45e10ef257c1633106ac747d3480c62e1fa"}, 0xd8) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685, &(0x7f0000000440)={0x1, 0x800, 0x1000, 0xf2, &(0x7f00000002c0)="4472fb61f88ee952000cdad3b6ef3fc3f8219a1d8f82e3f02d1f222b7210e893fe1ed5fca68ccc059e90eef79ac4b55dd0ac36a8bdd755ddb20df0a1f51ea0c882953f49722fec3ea08c759953d9e04adf994c42be47b5f5926e5cb49353cedd7cbed41e840ed0e2ee0d26a23464f6f7208d201df44a8090e6d247194fb4ee95b1581540e3d1f458cd2d57ebfbaadcf16720e8ba8bcb0a3eed75c0dda476482365b76a33ba54da703ffa7f8d66810aa31b4467aa5d73bed91d61714b2a2f389f3cf46f3820e39f1fbafae2ec237911a89fae1779fa869eb0e806d4a66ea3e87985165277ff0f7da5d198fd62962f5172117d", 0x72, 0x0, &(0x7f00000003c0)="ff2172366fea0b512049feec4dee2409236e4dd19d628af41cead870146da57739ecfd25608aedd8c7bc61a536d4538aae0d61674069cba1bed43c131e07eed7f31bc7cfab6b2239c92d8a2e44529d71d370bfe8338fb7af152b8102277af9730933edbf7fb24cd032b7713846985b2d9a19"}) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r0, r1, 0x0) ioctl$KVM_GET_SREGS(r3, 0x8138ae83, &(0x7f0000000180)) [ 1408.775821] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1408.790366] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1408.803229] FAULT_INJECTION: forcing a failure. [ 1408.803229] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1408.826659] CPU: 0 PID: 27666 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1408.833986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1408.843357] Call Trace: [ 1408.845961] dump_stack+0x138/0x19c [ 1408.849602] should_fail.cold+0x10f/0x159 [ 1408.853752] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1408.858416] ? lock_downgrade+0x6e0/0x6e0 [ 1408.862556] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1408.867562] ? check_preemption_disabled+0x3c/0x250 [ 1408.872572] alloc_pages_current+0xec/0x1e0 [ 1408.877143] ? quarantine_put+0xfa/0x1a0 [ 1408.881204] skb_page_frag_refill+0x1d3/0x3e0 [ 1408.885684] ? trace_hardirqs_on_caller+0x400/0x590 [ 1408.890693] sk_page_frag_refill+0x53/0x1c0 [ 1408.895016] alloc_sg+0x127/0x6e0 [ 1408.898459] alloc_encrypted_sg+0x8a/0x100 [ 1408.902681] ? ipv6_frag_exit+0x40/0x40 [ 1408.906642] tls_sw_sendmsg+0x902/0x1020 [ 1408.910694] ? selinux_tun_dev_create+0xc0/0xc0 [ 1408.915350] ? alloc_encrypted_sg+0x100/0x100 [ 1408.919838] ? __fget+0x237/0x370 [ 1408.923280] inet_sendmsg+0x122/0x500 [ 1408.927065] ? inet_recvmsg+0x500/0x500 [ 1408.931023] sock_sendmsg+0xce/0x110 [ 1408.934722] SYSC_sendto+0x206/0x310 [ 1408.938443] ? SYSC_connect+0x2d0/0x2d0 [ 1408.942404] ? lock_downgrade+0x6e0/0x6e0 [ 1408.946544] ? wait_for_completion+0x420/0x420 [ 1408.951988] ? __sb_end_write+0xc1/0x100 [ 1408.956052] ? fput+0xd4/0x150 [ 1408.959237] ? SyS_write+0x15e/0x230 [ 1408.962938] SyS_sendto+0x40/0x50 [ 1408.966375] ? SyS_getpeername+0x30/0x30 [ 1408.970421] do_syscall_64+0x1e8/0x640 [ 1408.974300] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1408.979139] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1408.984315] RIP: 0033:0x459829 [ 1408.987500] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1408.995198] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1409.002454] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1409.009711] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1409.017098] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 08:42:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x80000000) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000240)) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r3, 0xab08) setsockopt$inet6_buf(r3, 0x29, 0x2e, &(0x7f0000000180)="71c9117552f1d3c1bbd44e79039e56e0186272339f9c6ef435cafff4d189cc167d134c48b67af3ae3f7504f29f40d848ade736dbd82b830eeae3af78355945cc7992fa4bd8195dff768bf5324baa2df8a0e09c62e2317c3b31a4a485dd81da363b6d458cf180a72ad6", 0x69) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x4, @dev={0xfe, 0x80, [], 0x1e}, 0x8000}, 0x1c) dup3(r0, r1, 0x0) [ 1409.024369] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in6={{0xa, 0x4e21, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}}, 0x0, 0x6, 0x0, "715179f59c4c305c45c02e5fd6c26c1bedaa10db899af07039390a7ed1056660cdc6b29863a3bf7ab9a4641a59a941032632a53185049f8dbc1957cf9e7ca45e10ef257c1633106ac747d3480c62e1fa"}, 0xd8) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685, &(0x7f0000000440)={0x1, 0x800, 0x1000, 0xf2, &(0x7f00000002c0)="4472fb61f88ee952000cdad3b6ef3fc3f8219a1d8f82e3f02d1f222b7210e893fe1ed5fca68ccc059e90eef79ac4b55dd0ac36a8bdd755ddb20df0a1f51ea0c882953f49722fec3ea08c759953d9e04adf994c42be47b5f5926e5cb49353cedd7cbed41e840ed0e2ee0d26a23464f6f7208d201df44a8090e6d247194fb4ee95b1581540e3d1f458cd2d57ebfbaadcf16720e8ba8bcb0a3eed75c0dda476482365b76a33ba54da703ffa7f8d66810aa31b4467aa5d73bed91d61714b2a2f389f3cf46f3820e39f1fbafae2ec237911a89fae1779fa869eb0e806d4a66ea3e87985165277ff0f7da5d198fd62962f5172117d", 0x72, 0x0, &(0x7f00000003c0)="ff2172366fea0b512049feec4dee2409236e4dd19d628af41cead870146da57739ecfd25608aedd8c7bc61a536d4538aae0d61674069cba1bed43c131e07eed7f31bc7cfab6b2239c92d8a2e44529d71d370bfe8338fb7af152b8102277af9730933edbf7fb24cd032b7713846985b2d9a19"}) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r0, r1, 0x0) ioctl$KVM_GET_SREGS(r3, 0x8138ae83, &(0x7f0000000180)) 08:42:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) readlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=""/4096, 0x1000) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f98167) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r1, r1, 0x0) 08:42:42 executing program 2 (fault-call:7 fault-nth:29): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1409.174241] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1409.191350] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1409.270744] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1409.298313] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1409.323098] FAULT_INJECTION: forcing a failure. [ 1409.323098] name failslab, interval 1, probability 0, space 0, times 0 [ 1409.334877] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r3 = add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$assume_authority(0x10, r3) listen(r1, 0x7) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x10c4bb8f0822d7fb) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r4 = dup3(r0, r1, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r4, 0x4010ae94, &(0x7f0000000180)={0x9, 0x5, 0xc80}) [ 1409.387456] CPU: 0 PID: 27697 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1409.394704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1409.404081] Call Trace: [ 1409.406684] dump_stack+0x138/0x19c [ 1409.410329] should_fail.cold+0x10f/0x159 [ 1409.414600] should_failslab+0xdb/0x130 [ 1409.418597] __kmalloc+0x71/0x7a0 [ 1409.422069] ? gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1409.427270] gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1409.432295] ? __lock_is_held+0xb6/0x140 [ 1409.436362] ? check_preemption_disabled+0x3c/0x250 [ 1409.441430] generic_gcmaes_encrypt+0xf4/0x130 [ 1409.446020] ? helper_rfc4106_encrypt+0x320/0x320 [ 1409.450870] ? __kmalloc+0x376/0x7a0 [ 1409.454610] gcmaes_wrapper_encrypt+0xef/0x150 [ 1409.459305] tls_push_record+0x906/0x1210 [ 1409.463449] tls_sw_sendmsg+0x9e8/0x1020 [ 1409.463467] ? selinux_tun_dev_create+0xc0/0xc0 [ 1409.463483] ? alloc_encrypted_sg+0x100/0x100 [ 1409.463492] ? __fget+0x237/0x370 [ 1409.463508] inet_sendmsg+0x122/0x500 [ 1409.463517] ? inet_recvmsg+0x500/0x500 [ 1409.487978] sock_sendmsg+0xce/0x110 [ 1409.491709] SYSC_sendto+0x206/0x310 [ 1409.495438] ? SYSC_connect+0x2d0/0x2d0 [ 1409.499513] ? lock_downgrade+0x6e0/0x6e0 [ 1409.503724] ? wait_for_completion+0x420/0x420 [ 1409.508322] ? __sb_end_write+0xc1/0x100 [ 1409.512395] ? fput+0xd4/0x150 [ 1409.515601] ? SyS_write+0x15e/0x230 [ 1409.519324] SyS_sendto+0x40/0x50 [ 1409.522771] ? SyS_getpeername+0x30/0x30 [ 1409.526827] do_syscall_64+0x1e8/0x640 [ 1409.530720] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1409.535925] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1409.541125] RIP: 0033:0x459829 [ 1409.544317] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1409.552207] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1409.559594] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1409.566873] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1409.574137] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1409.581393] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) bind$unix(r2, &(0x7f0000000200)=@file={0x36a2ae09c07b3193, './file0\x00'}, 0xc) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e23, 0x22acc, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xce}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xe32f, 0x20000) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000100)=0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r2, 0x0) 08:42:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:42 executing program 2 (fault-call:7 fault-nth:30): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1409.675949] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1409.694343] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1409.715835] FAULT_INJECTION: forcing a failure. [ 1409.715835] name failslab, interval 1, probability 0, space 0, times 0 [ 1409.727503] CPU: 0 PID: 27721 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1409.734625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1409.743997] Call Trace: [ 1409.746600] dump_stack+0x138/0x19c [ 1409.750245] should_fail.cold+0x10f/0x159 [ 1409.754405] should_failslab+0xdb/0x130 [ 1409.758393] kmem_cache_alloc_node+0x287/0x780 [ 1409.762984] ? tcp_established_options+0x2c5/0x420 [ 1409.767912] __alloc_skb+0x9c/0x500 [ 1409.771527] ? skb_scrub_packet+0x4b0/0x4b0 [ 1409.775847] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1409.780942] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 1409.785943] sk_stream_alloc_skb+0xb3/0x780 [ 1409.790250] ? tcp_send_mss+0xa4/0x2f0 [ 1409.799424] ? ipv6_frag_exit+0x40/0x40 [ 1409.803384] do_tcp_sendpages+0x7d5/0x17d0 [ 1409.807615] ? sk_stream_alloc_skb+0x780/0x780 [ 1409.812184] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 1409.817362] tls_push_sg+0x1e1/0x660 [ 1409.821067] tls_push_record+0xa4a/0x1210 [ 1409.825208] tls_sw_sendmsg+0x9e8/0x1020 [ 1409.829273] ? selinux_tun_dev_create+0xc0/0xc0 [ 1409.833941] ? alloc_encrypted_sg+0x100/0x100 [ 1409.838425] ? __fget+0x237/0x370 [ 1409.841871] inet_sendmsg+0x122/0x500 [ 1409.845669] ? inet_recvmsg+0x500/0x500 [ 1409.849977] sock_sendmsg+0xce/0x110 [ 1409.853679] SYSC_sendto+0x206/0x310 [ 1409.857385] ? SYSC_connect+0x2d0/0x2d0 [ 1409.861347] ? lock_downgrade+0x6e0/0x6e0 [ 1409.865504] ? wait_for_completion+0x420/0x420 [ 1409.870076] ? __sb_end_write+0xc1/0x100 [ 1409.874124] ? fput+0xd4/0x150 [ 1409.877395] ? SyS_write+0x15e/0x230 [ 1409.881094] SyS_sendto+0x40/0x50 [ 1409.884703] ? SyS_getpeername+0x30/0x30 [ 1409.888750] do_syscall_64+0x1e8/0x640 [ 1409.892621] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1409.897453] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1409.902627] RIP: 0033:0x459829 [ 1409.905817] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1409.913510] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1409.920764] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1409.928034] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1409.935292] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1409.942547] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xe78, 0x400002) ioctl$VFIO_IOMMU_GET_INFO(r2, 0x3b70, &(0x7f0000000100)={0x10}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:43 executing program 2 (fault-call:7 fault-nth:31): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1410.063322] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1410.093129] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x3) 08:42:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1410.109067] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1410.146748] FAULT_INJECTION: forcing a failure. [ 1410.146748] name failslab, interval 1, probability 0, space 0, times 0 [ 1410.174749] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1410.203518] CPU: 1 PID: 27739 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1410.210670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1410.220066] Call Trace: [ 1410.222675] dump_stack+0x138/0x19c [ 1410.226324] should_fail.cold+0x10f/0x159 [ 1410.230580] should_failslab+0xdb/0x130 [ 1410.234569] kmem_cache_alloc_node_trace+0x280/0x770 [ 1410.239684] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1410.245160] __kmalloc_node_track_caller+0x3d/0x80 [ 1410.250108] __kmalloc_reserve.isra.0+0x40/0xe0 [ 1410.254797] __alloc_skb+0xcf/0x500 [ 1410.258447] ? skb_scrub_packet+0x4b0/0x4b0 [ 1410.262781] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1410.267893] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 1410.272920] sk_stream_alloc_skb+0xb3/0x780 [ 1410.277250] ? tcp_send_mss+0xa4/0x2f0 [ 1410.281143] ? ipv6_frag_exit+0x40/0x40 [ 1410.285122] do_tcp_sendpages+0x7d5/0x17d0 [ 1410.289381] ? sk_stream_alloc_skb+0x780/0x780 [ 1410.293968] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 1410.299143] tls_push_sg+0x1e1/0x660 [ 1410.302883] tls_push_record+0xa4a/0x1210 [ 1410.307044] tls_sw_sendmsg+0x9e8/0x1020 [ 1410.311097] ? selinux_tun_dev_create+0xc0/0xc0 [ 1410.315770] ? alloc_encrypted_sg+0x100/0x100 [ 1410.320257] ? __fget+0x237/0x370 [ 1410.323700] inet_sendmsg+0x122/0x500 [ 1410.327481] ? inet_recvmsg+0x500/0x500 [ 1410.331445] sock_sendmsg+0xce/0x110 [ 1410.335162] SYSC_sendto+0x206/0x310 [ 1410.338949] ? SYSC_connect+0x2d0/0x2d0 [ 1410.342909] ? lock_downgrade+0x6e0/0x6e0 [ 1410.347064] ? wait_for_completion+0x420/0x420 [ 1410.351635] ? __sb_end_write+0xc1/0x100 [ 1410.355683] ? fput+0xd4/0x150 [ 1410.358859] ? SyS_write+0x15e/0x230 [ 1410.362575] SyS_sendto+0x40/0x50 [ 1410.366028] ? SyS_getpeername+0x30/0x30 [ 1410.370075] do_syscall_64+0x1e8/0x640 [ 1410.373947] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1410.378954] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1410.384128] RIP: 0033:0x459829 [ 1410.387301] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1410.395006] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1410.402256] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1410.409527] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1410.416785] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 08:42:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x3000)=nil, 0x7000) shmdt(r2) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x10081, 0x0) connect$x25(r3, &(0x7f00000001c0)={0x9, @null=' \x00'}, 0x12) write$P9_RXATTRWALK(r3, &(0x7f0000000100)={0xf, 0x1f, 0x1, 0x10001}, 0xf) r4 = dup3(r0, r1, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000180)={0x4, 0x80000001, 0x7ff, 0x6, 0x1, 0x0, 0x3, 0x1, 0x7, 0x100000001, 0x72d2, 0x81}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x81, @loopback, 0x3}}, 0x1000, 0x4, 0x7e92e641, 0xf07, 0x9}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000300)={0x0, 0x400, 0x100000000, 0x1}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000380)={r5, 0x1, 0x401, 0x9, 0x4a, 0x100000001, 0x100, 0x3f, {r6, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x25}}}, 0x400, 0xeb8c, 0x10001, 0x3, 0x200}}, &(0x7f0000000440)=0xb0) [ 1410.424038] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1410.464199] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x47d67ba0f7059cbd) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000100)={0x14, 0x16, &(0x7f0000000080)="7bf65045b1634571e4bbd57866faa8a7cfe02ec21d18"}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x60000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000180)={0x1, &(0x7f0000000100)=[{0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f00000001c0)={r3, 0x2}) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) setsockopt$inet6_buf(r2, 0x29, 0xff, &(0x7f0000000200)="ad75055db98c09f26bdabee42915a54df7eb353b3c4d9587ec0941e795a6eb0e0a850ba553d5e72bc9a9877f7614cb54db77a13e64a96716af4457bd184eb4f4738670fb168e5bc34c9ad798ae9aea8f144b40815a201bb5f8a2fcfc29c4f649d1b5fbebd058089b305381d39f534a4f57ba0d04b82ba52ec7c69ae490be43a41878ef5040e355e728157b43bfcfb04f55f15f84be25c49ab6deeda6b4e8b560bed23b2650660103f953e7b9be37989c3ed6beac3cf0c4553c3f731b607cc635b29bfb95", 0xc4) 08:42:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:43 executing program 2 (fault-call:7 fault-nth:32): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1410.629098] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1410.650203] FAULT_INJECTION: forcing a failure. [ 1410.650203] name fail_page_alloc, interval 1, probability 0, space 0, times 0 08:42:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@gcm_256={{0x307}, "1f50ca31f89c1ab4", "fd6f5ea2be48960f4cce6061200a38c7ae12bf148fd1c44ed344c1c78f1870e0", "efd6d7da", "4e1ed6e145aaa1e0"}, 0x38) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) [ 1410.669728] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1410.711634] CPU: 1 PID: 27770 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1410.718803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1410.726146] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1410.728165] Call Trace: [ 1410.728189] dump_stack+0x138/0x19c [ 1410.728212] should_fail.cold+0x10f/0x159 [ 1410.748866] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1410.753542] ? lock_downgrade+0x6e0/0x6e0 [ 1410.757714] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1410.762788] ? check_preemption_disabled+0x3c/0x250 [ 1410.767806] alloc_pages_current+0xec/0x1e0 [ 1410.772212] ? quarantine_put+0xfa/0x1a0 [ 1410.776351] skb_page_frag_refill+0x1d3/0x3e0 [ 1410.780851] ? trace_hardirqs_on_caller+0x400/0x590 [ 1410.786750] sk_page_frag_refill+0x53/0x1c0 [ 1410.791172] alloc_sg+0x127/0x6e0 [ 1410.794657] alloc_encrypted_sg+0x8a/0x100 [ 1410.798897] ? ipv6_frag_exit+0x40/0x40 [ 1410.803048] tls_sw_sendmsg+0x902/0x1020 [ 1410.807296] ? selinux_tun_dev_create+0xc0/0xc0 08:42:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1410.811980] ? alloc_encrypted_sg+0x100/0x100 [ 1410.811992] ? __fget+0x237/0x370 [ 1410.812011] inet_sendmsg+0x122/0x500 [ 1410.820065] ? inet_recvmsg+0x500/0x500 [ 1410.820078] sock_sendmsg+0xce/0x110 [ 1410.820088] SYSC_sendto+0x206/0x310 [ 1410.820098] ? SYSC_connect+0x2d0/0x2d0 [ 1410.820112] ? lock_downgrade+0x6e0/0x6e0 [ 1410.820136] ? wait_for_completion+0x420/0x420 [ 1410.848621] ? __sb_end_write+0xc1/0x100 [ 1410.852689] ? fput+0xd4/0x150 [ 1410.855907] ? SyS_write+0x15e/0x230 [ 1410.859623] SyS_sendto+0x40/0x50 [ 1410.863083] ? SyS_getpeername+0x30/0x30 [ 1410.867139] do_syscall_64+0x1e8/0x640 [ 1410.871011] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1410.875845] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1410.881020] RIP: 0033:0x459829 [ 1410.884191] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1410.892056] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1410.899310] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 08:42:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1410.906575] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1410.913846] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1410.921107] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1410.973377] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xd92d003b3579ba89, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @mcast1}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r1, r1, 0x0) 08:42:44 executing program 2 (fault-call:7 fault-nth:33): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1411.069695] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1411.141032] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1411.180249] FAULT_INJECTION: forcing a failure. [ 1411.180249] name failslab, interval 1, probability 0, space 0, times 0 [ 1411.209927] CPU: 0 PID: 27800 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1411.217267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1411.226624] Call Trace: [ 1411.229467] dump_stack+0x138/0x19c [ 1411.233098] should_fail.cold+0x10f/0x159 [ 1411.237238] should_failslab+0xdb/0x130 [ 1411.241205] kmem_cache_alloc_node_trace+0x280/0x770 [ 1411.246296] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1411.251746] __kmalloc_node_track_caller+0x3d/0x80 [ 1411.256666] __kmalloc_reserve.isra.0+0x40/0xe0 [ 1411.261324] __alloc_skb+0xcf/0x500 [ 1411.264936] ? skb_scrub_packet+0x4b0/0x4b0 [ 1411.269242] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1411.274705] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 1411.279721] sk_stream_alloc_skb+0xb3/0x780 [ 1411.284026] ? tcp_send_mss+0xa4/0x2f0 [ 1411.287903] ? ipv6_frag_exit+0x40/0x40 [ 1411.291861] do_tcp_sendpages+0x7d5/0x17d0 [ 1411.296091] ? sk_stream_alloc_skb+0x780/0x780 [ 1411.300665] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 1411.305844] tls_push_sg+0x1e1/0x660 [ 1411.309550] tls_push_record+0xa4a/0x1210 [ 1411.313700] tls_sw_sendmsg+0x9e8/0x1020 [ 1411.317753] ? selinux_tun_dev_create+0xc0/0xc0 [ 1411.322434] ? alloc_encrypted_sg+0x100/0x100 [ 1411.326915] ? __fget+0x237/0x370 [ 1411.330357] inet_sendmsg+0x122/0x500 [ 1411.334142] ? inet_recvmsg+0x500/0x500 [ 1411.338113] sock_sendmsg+0xce/0x110 [ 1411.341819] SYSC_sendto+0x206/0x310 [ 1411.345534] ? SYSC_connect+0x2d0/0x2d0 [ 1411.349505] ? lock_downgrade+0x6e0/0x6e0 [ 1411.353651] ? wait_for_completion+0x420/0x420 [ 1411.358486] ? __sb_end_write+0xc1/0x100 [ 1411.362709] ? fput+0xd4/0x150 [ 1411.365907] ? SyS_write+0x15e/0x230 [ 1411.369616] SyS_sendto+0x40/0x50 [ 1411.373258] ? SyS_getpeername+0x30/0x30 [ 1411.377322] do_syscall_64+0x1e8/0x640 [ 1411.381480] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1411.386310] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1411.391484] RIP: 0033:0x459829 [ 1411.394656] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1411.402359] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1411.409618] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1411.416877] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1411.424130] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1411.431386] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1411.438895] net_ratelimit: 18 callbacks suppressed [ 1411.438900] protocol 88fb is buggy, dev hsr_slave_0 [ 1411.449075] protocol 88fb is buggy, dev hsr_slave_1 [ 1411.454276] protocol 88fb is buggy, dev hsr_slave_0 [ 1411.459358] protocol 88fb is buggy, dev hsr_slave_1 08:42:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) sendto$inet(r2, &(0x7f0000000240)="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", 0xfb, 0x40000, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e24, 0x5, @local, 0x1b}}, 0xffffffffffffff7f, 0x6}, &(0x7f0000000400)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000440)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f0000000500)=0x84) r4 = dup3(r0, r1, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r4, 0x80605414, &(0x7f0000000180)=""/147) 08:42:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000180)="477dce2ff13c2cd8ec7c20b32d510be7a70e8d9b4ec319300e145338f055aa9bd00442671cdd73a2e8e4f6e6015d69973a3822df07e8334c38b2639d7e418aeb3b6c53b206e38914517d66910f016752cbfa95ce", 0x54, 0x0, 0x0, 0x0) dup3(r0, r1, 0x0) 08:42:44 executing program 2 (fault-call:7 fault-nth:34): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1411.557225] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1411.568522] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1411.583883] FAULT_INJECTION: forcing a failure. [ 1411.583883] name failslab, interval 1, probability 0, space 0, times 0 [ 1411.591963] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1411.622743] CPU: 0 PID: 27816 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1411.629900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1411.639269] Call Trace: [ 1411.641872] dump_stack+0x138/0x19c [ 1411.645604] should_fail.cold+0x10f/0x159 [ 1411.649764] should_failslab+0xdb/0x130 [ 1411.653754] __kmalloc+0x71/0x7a0 [ 1411.657218] ? gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1411.662403] gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1411.667408] ? __lock_is_held+0xb6/0x140 [ 1411.670121] protocol 88fb is buggy, dev hsr_slave_0 [ 1411.671487] ? check_preemption_disabled+0x3c/0x250 [ 1411.676562] protocol 88fb is buggy, dev hsr_slave_1 [ 1411.681518] generic_gcmaes_encrypt+0xf4/0x130 [ 1411.681527] ? helper_rfc4106_encrypt+0x320/0x320 [ 1411.681540] ? __kmalloc+0x376/0x7a0 [ 1411.681553] gcmaes_wrapper_encrypt+0xef/0x150 [ 1411.681569] tls_push_record+0x906/0x1210 [ 1411.686686] protocol 88fb is buggy, dev hsr_slave_0 [ 1411.691139] tls_sw_sendmsg+0x9e8/0x1020 [ 1411.691157] ? selinux_tun_dev_create+0xc0/0xc0 [ 1411.696017] protocol 88fb is buggy, dev hsr_slave_1 [ 1411.699687] ? alloc_encrypted_sg+0x100/0x100 [ 1411.731665] ? __fget+0x237/0x370 [ 1411.735115] inet_sendmsg+0x122/0x500 [ 1411.738901] ? inet_recvmsg+0x500/0x500 [ 1411.742862] sock_sendmsg+0xce/0x110 [ 1411.746567] SYSC_sendto+0x206/0x310 [ 1411.750268] ? SYSC_connect+0x2d0/0x2d0 [ 1411.754231] ? lock_downgrade+0x6e0/0x6e0 [ 1411.758394] ? wait_for_completion+0x420/0x420 [ 1411.762980] ? __sb_end_write+0xc1/0x100 [ 1411.767031] ? fput+0xd4/0x150 [ 1411.770294] ? SyS_write+0x15e/0x230 [ 1411.773995] SyS_sendto+0x40/0x50 [ 1411.777434] ? SyS_getpeername+0x30/0x30 [ 1411.781496] do_syscall_64+0x1e8/0x640 [ 1411.785400] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1411.790268] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1411.800747] RIP: 0033:0x459829 [ 1411.803925] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1411.811633] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 08:42:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xfffffe16) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1411.818891] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1411.826145] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1411.833490] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1411.841098] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$sock(r1, &(0x7f0000002f40)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000380)="223cedd811553497d0dce475942351f19bcce6449a3ce960ad5b9ad21d8e77ff1d5e9701b8250f3906118b85e536ef73fc9d0a425aad3ced2e60a92f0fae0e72ed6820cb8b16cd7b6f2fd283f7079c58d8c49538d98c134cfc8e43e1250ceccdbad9f3d688e3c6a4d695899ffe4ad6cdbcd2e15437", 0x75}], 0x1, &(0x7f0000000400)=[@mark={{0x14, 0x1, 0x24, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x100}}, @txtime={{0x18, 0x1, 0x3d, 0x21c9}}, @txtime={{0x18, 0x1, 0x3d, 0xcf5d43}}, @mark={{0x14, 0x1, 0x24, 0xffffffffffffff1e}}, @mark={{0x14, 0x1, 0x24, 0x7}}], 0x90}}, {{&(0x7f00000004c0)=@un=@abs={0x0, 0x0, 0x4e22}, 0x80, &(0x7f0000001840)=[{&(0x7f0000000540)="e9676b8a972be3da411610a6ef6a7865283087f726ffb609f1b12577bdf353cc5e813a7a5ec96c99c810461fa7bf4d15c6841070714ddba2cfcdd434c7e6564a0b16326ab23787ed9ab79c8f59c8c8dc741072b1812c8d39a52cf90fd81ada7ec53de9f78fae1f9be58952f59520cdfd587482fdec31597f5a7e3b54599d0b1c18a2d66fb8ad861ac183f5efb0073a2d8ae6f70789b8c43f260edcab40a92d6a7c23b911e1eca17c84572cd15d26383986016dce9112ca0e55045d69a140", 0xbe}, {&(0x7f0000000600)="cf39965dcec5fc0810a2f286fd7748424bd1ea74314947b91deae7617651c610b082941702723de60d0b7b96cbf2a54466f140330a5ca2a18c0c8fbab5131d8b89bb8e994e3626fc40422ea0eb3b754329d3a78ccda72a8179630f7e6357", 0x5e}, {&(0x7f0000000680)="b56c1a8069a45850280b252afc0a76f5c4403582f85c21e599ab0099422ebe274376ad7319c52f22eaea9cc8b76f01a13ad6dd91610fa17e5a6c3126425e79dd21262709c31f4367f24a67a85097c2f5cbfd683ca6d6d86affbec1d747fec3798d15ca8b49fbae607f5b10c018630bde3c", 0x71}, {&(0x7f0000000700)="085b626ab4a83c4abd7aeeec1231353ea0cb759b31189818ba839f14f496f55781c4cd76f2f8b7a1c17522e7afc968633059855421bc01a3f840d498d64b21e2b4fcec7b0d40fdc8582585307a3194a441f8562c", 0x54}, {&(0x7f0000000780)="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", 0x1000}, {&(0x7f0000001780)="c011f2d4be860afa6f434e77bf6d1c2eee72ec23958d15f03d657134985ed9813ffe01bc8d6b695dc33162fac89bf0058c06", 0x32}, {&(0x7f00000017c0)="81dc91ca77d65ea76057c17932a3f3598f881de8fe03453868cf500eff728b6fbab019e680b3c24151573964e4383cd8ab411b9ef98cbe967e83b03e007a832ae821fc75a5f6f761a66f65119fd4b715a208df0c8cf5dac200d2311f79adda54ecb4f2333b", 0x65}], 0x7}}, {{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000018c0)="d05262d793c63fda594c5330a650cb82f7609304", 0x14}, {&(0x7f0000001900)="720539453b428c8396ebf7dba3575d54761398f8b6d45ddc6a6ed4cb105f9cb40765baad9149e482b45640f9bb8657e9d14233f92e413f996f055c29141fefc66a03ebd83cac31ab87fcb45a92ab7cef5d06b29ee233776c65e513fa3340522a6b71fbe4e02e8e5c3efcfef26a77464244075b56ce999b304684e5d9bad7718bc3faf0ceec8898fc5f363dd0901b042eda261cb4112335f1d8", 0x99}, {&(0x7f00000019c0)="d78439f59d3853d4d8", 0x9}, {&(0x7f0000001a00)="751a8f10dd78051719b27aface0ccf80f1f0d4438c07e8cafe11aa76314317a14680399d81c559d0823bcfaa4e2d1f97a0535ad78c23f2219ae82b472aff81564e3b9f80101363ad2a8aba659335d83f86a9f5c9df371e467fc3487dc6fa7a8da6a4a47dffb4599fd8839791f853fd6f769a5e70e3b99f39b472ee79fa28e48df176499632a3a7a884f8181aba9c4ef9e604ab0d77240840b6b2ca6cbd9fe386f65c1508fc8c11cc5c7214811f9cc4a7be94a49200bcdcfdc9d177a0f782632d95432f1d7580a59e10ab23ac7f97103998d4636979de12d6bbbd6923e42a7a6924", 0xe1}, {&(0x7f0000001b00)="238e83c3d974d2513b30d4b857c2cf3159b9ea0e739338385cff56f503cab38d8fe17ea838ebb01342f442f153623e259df369427c8ae61259a88e0f7ff2ad61aef565abfb600c73112148a4a7a2d09e1e5e572347589a", 0x57}, {&(0x7f0000001b80)="ef98ca4447b3661540da209e2e64b0fa4f8f55c0c70e3ac02c4a2dde4dfcb7ea6f3d23bfe6cd742053bc400c82defb4aaab98e2127cf6620b1ce45cf7bf93867b80f0f4b517413ec98abc6aa4cb079cd5a04069e509e83e796dae3a7dc0cb5953063ca386782a03d64e29a0206fb130e6b657e56ef1a394c2684d295b850c4ab205b93b57047ea5e11521061ca2e75555fcd9b6a0f407d1134ad03ca59b5f6641ac490d9ce", 0xa5}, {&(0x7f0000001c40)="c7e419efb6986523c3e96f811a7f761254edc7c54c0efe6cdc5cb40c1c62ddd6a9471425311a6bd36cbbdb16c5e7cee20cea1a33d09041d05081ed5254a89ce436ad49d8e1b5acf4d8d59364cc68381f8128a6ec2ff8fbaa1da8dae57360ba238d324a640cab9a4097c777994d1e38a00ade1274720678b3dbc5aae5d0a58740d745fca7d91b08876b602df80272d55dea51ceea82b32113ecf139c7bea994bff0330a1479ca2657ff59636922de97050d3394f1f177b0fb23a83fa51f61b1e694c0659e0d6f428ed4b60cbf0246b9be", 0xd0}, {&(0x7f0000001d40)="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", 0x1000}, {&(0x7f0000002d40)="7f6a651c855eae5ce048e85d05f4c6c83b10295d07a0033f23ff3c87a8bc9341ec79dbd984ecc02a3759dc7da05cce2a4f880bf74cacec7160267ef11def5291bce93715d933899482f410c110afe33fd85c0ac1ea2dc0f3ef596bcd2d07679b3b2a847a16456a6879afbf6b906b5198b26efe3ff529a0fcbf3597dfd711160b889267011fb0c0027990f42d41486d4df77f58a8328e1e2c2a819633", 0x9c}], 0x9, &(0x7f0000002ec0)=[@txtime={{0x18, 0x1, 0x3d, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0xff}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x10000}}], 0x60}}], 0x3, 0x40800) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x4, 0x240000) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={0x0, 0xf0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000340)={r3, 0xffffff7fffff8000, 0x5, [0x8142, 0x804a9f, 0x7, 0xeb4, 0x20]}, 0x0) getpeername$netrom(r2, &(0x7f0000000280)={{0x3, @default}, [@netrom, @remote, @netrom, @null, @remote, @bcast, @null, @null]}, &(0x7f0000000300)=0x48) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000240)={0x4, &(0x7f0000000200)=[{0x8, 0x2, 0x5197839b, 0xb22}, {0x4, 0x7ff, 0x1ff, 0x10001}, {0x0, 0x4, 0xffff, 0x5}, {0x20, 0x6, 0x5}]}, 0x10) dup3(r0, r1, 0x0) 08:42:45 executing program 2 (fault-call:7 fault-nth:35): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1411.910135] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_settime(0x0, &(0x7f0000000140)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000340)={0x40, 0x6cf, 0xff, 0xd4, 0x1, 0x80000001}) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000100)=0x200) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000180)={0x7b, 0x0, [0x778, 0x7, 0x8, 0x52a4]}) dup3(r0, r1, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r2, 0xc1205531, &(0x7f0000000200)={0x9, 0x9, 0x1, 0x9, [], [], [], 0x7, 0x2, 0x5, 0x9, "e0ad3a6f027999bb3ff0a1b48ac8c08d"}) 08:42:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000180)="477dce2ff13c2cd8ec7c20b32d510be7a70e8d9b4ec319300e145338f055aa9bd00442671cdd73a2e8e4f6e6015d69973a3822df07e8334c38b2639d7e418aeb3b6c53b206e38914517d66910f016752cbfa95ce", 0x54, 0x0, 0x0, 0x0) dup3(r0, r1, 0x0) [ 1411.954961] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1412.012833] FAULT_INJECTION: forcing a failure. [ 1412.012833] name failslab, interval 1, probability 0, space 0, times 0 [ 1412.021508] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1412.039976] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1412.079394] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1412.081775] CPU: 0 PID: 27838 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1412.096854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1412.096861] Call Trace: [ 1412.096879] dump_stack+0x138/0x19c [ 1412.096898] should_fail.cold+0x10f/0x159 [ 1412.096914] should_failslab+0xdb/0x130 [ 1412.121099] kmem_cache_alloc_node+0x287/0x780 [ 1412.125709] ? tcp_established_options+0x2c5/0x420 [ 1412.130656] __alloc_skb+0x9c/0x500 [ 1412.130670] ? skb_scrub_packet+0x4b0/0x4b0 [ 1412.130681] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1412.130697] sk_stream_alloc_skb+0xb3/0x780 [ 1412.130705] ? __sk_mem_schedule+0xa1/0xd0 [ 1412.130717] ? ipv6_frag_exit+0x40/0x40 [ 1412.130727] do_tcp_sendpages+0x7d5/0x17d0 [ 1412.130747] ? sk_stream_alloc_skb+0x780/0x780 [ 1412.130761] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 1412.170488] tls_push_sg+0x1e1/0x660 [ 1412.174223] tls_push_record+0xa4a/0x1210 [ 1412.178378] tls_sw_sendmsg+0x9e8/0x1020 [ 1412.182433] ? selinux_tun_dev_create+0xc0/0xc0 [ 1412.187090] ? alloc_encrypted_sg+0x100/0x100 [ 1412.191569] ? __fget+0x237/0x370 [ 1412.195034] inet_sendmsg+0x122/0x500 [ 1412.198823] ? inet_recvmsg+0x500/0x500 [ 1412.202780] sock_sendmsg+0xce/0x110 [ 1412.206482] SYSC_sendto+0x206/0x310 [ 1412.210181] ? SYSC_connect+0x2d0/0x2d0 [ 1412.214146] ? lock_downgrade+0x6e0/0x6e0 [ 1412.218296] ? wait_for_completion+0x420/0x420 [ 1412.222867] ? __sb_end_write+0xc1/0x100 [ 1412.227011] ? fput+0xd4/0x150 [ 1412.230191] ? SyS_write+0x15e/0x230 [ 1412.233915] SyS_sendto+0x40/0x50 [ 1412.237359] ? SyS_getpeername+0x30/0x30 [ 1412.241407] do_syscall_64+0x1e8/0x640 [ 1412.245295] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1412.250126] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1412.255449] RIP: 0033:0x459829 [ 1412.258971] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1412.266665] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1412.274180] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1412.281436] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1412.288816] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1412.296071] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1412.366985] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = dup2(r1, r1) ioctl$KVM_NMI(r2, 0xae9a) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x5, @mcast2, 0x80}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000180), 0xffffffffffffffcd, 0x0, 0x0, 0x0) dup3(r0, r1, 0x0) 08:42:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200), &(0x7f0000000240)=0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:45 executing program 2 (fault-call:7 fault-nth:36): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{0x304}, "d02ede68abf432c9", "2fd60b5e987e68193b026114a1c12ac8", "65f7e04c", "c7a0a551c7b74244"}, 0x28) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x7c) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1412.530493] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1412.540556] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1412.550138] protocol 88fb is buggy, dev hsr_slave_0 [ 1412.556411] protocol 88fb is buggy, dev hsr_slave_1 [ 1412.567560] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1412.627068] FAULT_INJECTION: forcing a failure. [ 1412.627068] name failslab, interval 1, probability 0, space 0, times 0 [ 1412.646496] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1412.664043] CPU: 0 PID: 27873 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1412.671189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1412.680562] Call Trace: [ 1412.683167] dump_stack+0x138/0x19c [ 1412.686899] should_fail.cold+0x10f/0x159 [ 1412.691051] should_failslab+0xdb/0x130 [ 1412.695032] kmem_cache_alloc_node_trace+0x280/0x770 [ 1412.700162] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1412.706064] __kmalloc_node_track_caller+0x3d/0x80 [ 1412.710991] __kmalloc_reserve.isra.0+0x40/0xe0 [ 1412.715683] __alloc_skb+0xcf/0x500 [ 1412.719298] ? skb_scrub_packet+0x4b0/0x4b0 [ 1412.724273] ? lock_downgrade+0x6e0/0x6e0 [ 1412.728610] sk_stream_alloc_skb+0xb3/0x780 [ 1412.732945] ? __sk_mem_schedule+0xa1/0xd0 [ 1412.737187] ? ipv6_frag_exit+0x40/0x40 [ 1412.741172] do_tcp_sendpages+0x7d5/0x17d0 [ 1412.745406] ? sk_stream_alloc_skb+0x780/0x780 [ 1412.749997] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 1412.755213] tls_push_sg+0x1e1/0x660 [ 1412.757107] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1412.758964] tls_push_record+0xa4a/0x1210 [ 1412.758988] tls_sw_sendmsg+0x9e8/0x1020 08:42:45 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x6, 0x220000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000180)=0xc) fcntl$setownex(r0, 0xf, &(0x7f00000001c0)={0x1, r1}) r2 = semget(0x0, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000240)={r0, 0x100000000}) semctl$GETPID(r2, 0x800000000000000, 0xb, &(0x7f0000000200)=""/25) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r3, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r3, r4, 0x0) [ 1412.759006] ? selinux_tun_dev_create+0xc0/0xc0 [ 1412.782218] ? alloc_encrypted_sg+0x100/0x100 [ 1412.788248] ? __fget+0x237/0x370 [ 1412.791730] inet_sendmsg+0x122/0x500 [ 1412.795543] ? inet_recvmsg+0x500/0x500 [ 1412.799531] sock_sendmsg+0xce/0x110 [ 1412.803256] SYSC_sendto+0x206/0x310 [ 1412.806968] ? SYSC_connect+0x2d0/0x2d0 [ 1412.811034] ? lock_downgrade+0x6e0/0x6e0 [ 1412.815192] ? wait_for_completion+0x420/0x420 [ 1412.819766] ? __sb_end_write+0xc1/0x100 [ 1412.823825] ? fput+0xd4/0x150 [ 1412.827023] ? SyS_write+0x15e/0x230 [ 1412.827107] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1412.830733] SyS_sendto+0x40/0x50 [ 1412.830742] ? SyS_getpeername+0x30/0x30 [ 1412.830756] do_syscall_64+0x1e8/0x640 [ 1412.830764] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1412.830781] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1412.863108] RIP: 0033:0x459829 [ 1412.866315] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 08:42:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = open(&(0x7f0000000080)='./file0\x00', 0xc8000, 0x80) getpeername(r0, &(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x80) bind$bt_hci(r2, &(0x7f0000000200)={0x1f, r3, 0x3}, 0xc) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xfd, 0x0, 0x0, 0xfe47) dup3(r0, r1, 0x0) 08:42:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffef0, 0x8000, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)=0x0) r4 = getpgid(r3) ptrace$peekuser(0x3, r4, 0x0) 08:42:46 executing program 2 (fault-call:7 fault-nth:37): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1412.874029] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1412.881315] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1412.881321] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1412.881325] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1412.881330] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1412.957828] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1412.982532] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1412.986079] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1413.024271] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1413.054811] FAULT_INJECTION: forcing a failure. [ 1413.054811] name failslab, interval 1, probability 0, space 0, times 0 [ 1413.066646] CPU: 0 PID: 27902 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1413.073766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1413.083220] Call Trace: [ 1413.085824] dump_stack+0x138/0x19c [ 1413.089646] should_fail.cold+0x10f/0x159 [ 1413.093813] should_failslab+0xdb/0x130 [ 1413.097803] __kmalloc+0x2f0/0x7a0 [ 1413.101350] ? tls_push_record+0xc03/0x1210 [ 1413.105675] ? trace_hardirqs_on_caller+0x400/0x590 [ 1413.110703] ? tls_push_record+0x10a/0x1210 [ 1413.115038] tls_push_record+0x10a/0x1210 [ 1413.119190] tls_sw_sendmsg+0x9e8/0x1020 [ 1413.123275] ? selinux_tun_dev_create+0xc0/0xc0 [ 1413.127974] ? alloc_encrypted_sg+0x100/0x100 [ 1413.132466] ? __fget+0x237/0x370 [ 1413.136181] inet_sendmsg+0x122/0x500 [ 1413.139962] ? inet_recvmsg+0x500/0x500 [ 1413.143919] sock_sendmsg+0xce/0x110 [ 1413.147624] SYSC_sendto+0x206/0x310 [ 1413.151325] ? SYSC_connect+0x2d0/0x2d0 [ 1413.155292] ? lock_downgrade+0x6e0/0x6e0 [ 1413.159448] ? wait_for_completion+0x420/0x420 [ 1413.164018] ? __sb_end_write+0xc1/0x100 [ 1413.168070] ? fput+0xd4/0x150 [ 1413.171258] ? SyS_write+0x15e/0x230 [ 1413.174970] SyS_sendto+0x40/0x50 [ 1413.178414] ? SyS_getpeername+0x30/0x30 [ 1413.182465] do_syscall_64+0x1e8/0x640 [ 1413.186334] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1413.191177] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1413.196349] RIP: 0033:0x459829 [ 1413.199522] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1413.207224] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1413.214479] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1413.221736] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1413.229282] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1413.236546] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0xffffffffffffffff) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f0000000180)="8ae612232c8ba9255acd6e8fbe77e5de1c338ee22a3647767da2fe49c5cbb70c71c715c534c5449450859a5e1f1c47957bfea724123d48e063c460f6084d4dadd07669fb4600079a20e7a47ac9b1302035a2c46dff820a5f2a7b84772de0eab8d4918416b213efce74f0d2fd05fbcd0c86a5c4beb8252f1b9ed5deea420509c07c84f2", 0x83, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x100000001, @ipv4={[], [], @empty}, 0x5}, 0x1c) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x1) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000240)={{0xfffffffffffffbff, 0xffff, 0x7, 0x3}, 'syz0\x00', 0x49}) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@gcm_256={{0x307}, "c5f7386ed8183e46", "47dd1c548ef9b251b69c7c5fa2bb1f1d983d3283e510883d44a8f51be30353bf", "5b59d685", "e9319b57112daa12"}, 0x38) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x1) ioctl$KVM_ASSIGN_SET_INTX_MASK(r2, 0x4040aea4, &(0x7f0000000100)={0x1f4, 0x1, 0x800, 0x3, 0x1f}) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000140)={0x344, 0xffffffffffffa056, 0xf1, &(0x7f00000001c0)="eeda9ddb1335c8088a720338756ecff2d01ed2e6a550b293d860ec97f318169db738a11269b8fe900532bbc2524c3294139db28e347d14482ab917e4ce90e3c23ab3645f474bca6602252f215a0da5798fa4b50bb8b0f3bd6a0d900f5e388cc7cd2a6af3a96deb6b78abcf70af59778e5721de885c9e734076f53890ef7347e80e7be954cd28482144bd6b0db65d20810389bf7e93993af0665a5b1dfbeeb590b2c4ff339ebba2199693243eee856d7f7da1f3ac9e0293e8b1a2e0c10b715153714b4fd9dfc7966cab3d0b67144f61e234e814e7949bdc275d341e06b5d335031223f8c06da03ef0358e60bfd8cd4f6479"}) dup3(r0, r1, 0x0) 08:42:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:46 executing program 2 (fault-call:7 fault-nth:38): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000080)=0x4) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1413.518508] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1413.532014] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1413.536319] FAULT_INJECTION: forcing a failure. [ 1413.536319] name failslab, interval 1, probability 0, space 0, times 0 [ 1413.594018] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1413.616008] CPU: 1 PID: 27922 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1413.623245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1413.632616] Call Trace: [ 1413.635658] dump_stack+0x138/0x19c [ 1413.639311] should_fail.cold+0x10f/0x159 [ 1413.643469] should_failslab+0xdb/0x130 [ 1413.647433] __kmalloc+0x71/0x7a0 [ 1413.650878] ? gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1413.656067] gcmaes_encrypt.constprop.0+0x143/0xb90 [ 1413.661080] ? __lock_is_held+0xb6/0x140 [ 1413.665133] ? check_preemption_disabled+0x3c/0x250 [ 1413.670139] generic_gcmaes_encrypt+0xf4/0x130 [ 1413.674710] ? helper_rfc4106_encrypt+0x320/0x320 [ 1413.679541] ? __kmalloc+0x376/0x7a0 [ 1413.683244] gcmaes_wrapper_encrypt+0xef/0x150 [ 1413.687815] tls_push_record+0x906/0x1210 [ 1413.691993] tls_sw_sendmsg+0x9e8/0x1020 [ 1413.696050] ? selinux_tun_dev_create+0xc0/0xc0 [ 1413.700712] ? alloc_encrypted_sg+0x100/0x100 [ 1413.705194] ? __fget+0x237/0x370 [ 1413.708644] inet_sendmsg+0x122/0x500 [ 1413.712431] ? inet_recvmsg+0x500/0x500 [ 1413.716393] sock_sendmsg+0xce/0x110 [ 1413.720100] SYSC_sendto+0x206/0x310 [ 1413.723801] ? SYSC_connect+0x2d0/0x2d0 [ 1413.727773] ? lock_downgrade+0x6e0/0x6e0 [ 1413.731915] ? wait_for_completion+0x420/0x420 [ 1413.736487] ? __sb_end_write+0xc1/0x100 [ 1413.740536] ? fput+0xd4/0x150 [ 1413.743715] ? SyS_write+0x15e/0x230 [ 1413.747438] SyS_sendto+0x40/0x50 [ 1413.750874] ? SyS_getpeername+0x30/0x30 [ 1413.754934] do_syscall_64+0x1e8/0x640 [ 1413.758808] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1413.763644] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1413.768818] RIP: 0033:0x459829 [ 1413.772001] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1413.779697] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1413.787045] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 08:42:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1413.794331] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1413.803236] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1413.810494] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:47 executing program 2 (fault-call:7 fault-nth:39): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1413.843584] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1413.881367] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x8001) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = geteuid() lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r2, r3) dup3(r0, r1, 0x0) 08:42:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000840)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000880)={0x0, @in6={{0xa, 0x4e24, 0x4, @loopback, 0x1}}, [0x3, 0x5, 0xf64e, 0x81, 0x8, 0x7, 0x7, 0x1, 0x8, 0x3, 0x7, 0x7, 0x3, 0x7f, 0x5]}, &(0x7f0000000980)=0x100) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000009c0)={r2, 0x8, 0x1, 0x5}, &(0x7f0000000a00)=0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000280)=0xffffffffffffffff, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000300)={r2, 0x1ff}, 0x8) write$P9_RWSTAT(r1, &(0x7f0000000080)={0x7, 0x7f, 0x1}, 0x6) listen(r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r4 = shmget(0x1, 0x3000, 0x80, &(0x7f0000ffb000/0x3000)=nil) shmat(r4, &(0x7f0000ffc000/0x2000)=nil, 0x2000) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) fcntl$lock(r3, 0x27, &(0x7f0000000200)={0x0, 0x3, 0x7f, 0x69, r5}) bind$ax25(r1, &(0x7f0000000180)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f0000000240)={0x0, 0x0, {0x4, 0x4, 0x2, 0x4008001}}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) r6 = dup3(r1, r0, 0xffffffffffffffff) setsockopt$inet_mreqsrc(r6, 0x0, 0x2f, &(0x7f00000002c0)={@loopback, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) [ 1413.941786] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1413.996412] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1414.047527] FAULT_INJECTION: forcing a failure. [ 1414.047527] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1414.074233] CPU: 0 PID: 27943 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1414.081390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1414.090764] Call Trace: [ 1414.093360] dump_stack+0x138/0x19c [ 1414.096988] should_fail.cold+0x10f/0x159 [ 1414.101138] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1414.105802] ? lock_downgrade+0x6e0/0x6e0 [ 1414.110226] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1414.115249] ? check_preemption_disabled+0x3c/0x250 [ 1414.120367] alloc_pages_current+0xec/0x1e0 [ 1414.124695] ? quarantine_put+0xfa/0x1a0 [ 1414.128769] skb_page_frag_refill+0x1d3/0x3e0 [ 1414.133289] ? trace_hardirqs_on_caller+0x400/0x590 [ 1414.138390] sk_page_frag_refill+0x53/0x1c0 [ 1414.142714] alloc_sg+0x127/0x6e0 [ 1414.146166] alloc_encrypted_sg+0x8a/0x100 [ 1414.150479] ? ipv6_frag_exit+0x40/0x40 [ 1414.154452] tls_sw_sendmsg+0x902/0x1020 [ 1414.158516] ? selinux_tun_dev_create+0xc0/0xc0 [ 1414.163200] ? alloc_encrypted_sg+0x100/0x100 [ 1414.167708] ? __fget+0x237/0x370 [ 1414.171163] inet_sendmsg+0x122/0x500 [ 1414.174962] ? inet_recvmsg+0x500/0x500 [ 1414.178935] sock_sendmsg+0xce/0x110 [ 1414.182676] SYSC_sendto+0x206/0x310 [ 1414.186404] ? SYSC_connect+0x2d0/0x2d0 [ 1414.190380] ? lock_downgrade+0x6e0/0x6e0 [ 1414.194543] ? wait_for_completion+0x420/0x420 [ 1414.199131] ? __sb_end_write+0xc1/0x100 [ 1414.203223] ? fput+0xd4/0x150 [ 1414.206414] ? SyS_write+0x15e/0x230 [ 1414.210132] SyS_sendto+0x40/0x50 [ 1414.213574] ? SyS_getpeername+0x30/0x30 [ 1414.217642] do_syscall_64+0x1e8/0x640 [ 1414.221545] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1414.226393] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1414.231578] RIP: 0033:0x459829 [ 1414.234760] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1414.242457] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1414.249721] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1414.257066] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1414.264502] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1414.271771] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0xbffffffffffffffd, @empty, 0x1}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'ip6gretap0\x00', r2}) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:47 executing program 5: syz_init_net_socket$llc(0x1a, 0x3, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x30800, 0x120) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000002c0)={0x0, 0xe5, "e53f701dfb21abacc1cb65c7a48e2fdd9bf59443d283ba5fd5c7e562ae2ac7150903c6e924e0f4ec2c8bc4eac49066f41d1bb8e4ee6fd55a8e1daebf7149521423bb2609d106d9325699207684b86a28e186d99fe234b377ffd3468bf39451a16f2c2c6a923c33a0475c3677c4f14588666ab40a0afbd32bb0900404743459f9898085ffe8118c8b9a3ea1ddae72ba131b73a28fe1ce8b0fef7876ec8b4b3864abfe1110df95eca6cf52caa40ffa08d59a14c3c0b98753b9782a3575cd5298164605c6248c71474521df1525a2e52e225082d3cc76a2837d0fd763acb03b8ebaf1b749ca9a"}, &(0x7f00000003c0)=0xed) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000400)={r3, 0x4}, &(0x7f0000000440)=0x8) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000180)) dup3(r0, r1, 0x80000) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x4000}) 08:42:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:47 executing program 2 (fault-call:7 fault-nth:40): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1414.441424] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1414.464325] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1414.485246] FAULT_INJECTION: forcing a failure. [ 1414.485246] name failslab, interval 1, probability 0, space 0, times 0 08:42:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x3) [ 1414.529276] bridge0: port 1(bridge_slave_0) entered disabled state [ 1414.530832] CPU: 1 PID: 27970 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1414.542757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1414.552134] Call Trace: [ 1414.554732] dump_stack+0x138/0x19c [ 1414.558384] should_fail.cold+0x10f/0x159 [ 1414.562522] should_failslab+0xdb/0x130 [ 1414.562533] __kmalloc+0x2f0/0x7a0 [ 1414.562546] ? trace_hardirqs_on_caller+0x400/0x590 [ 1414.562560] ? tls_push_record+0x10a/0x1210 [ 1414.562572] tls_push_record+0x10a/0x1210 [ 1414.562592] tls_sw_sendmsg+0x9e8/0x1020 [ 1414.562610] ? selinux_tun_dev_create+0xc0/0xc0 [ 1414.562625] ? alloc_encrypted_sg+0x100/0x100 [ 1414.585966] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1414.587604] ? __fget+0x237/0x370 [ 1414.587625] inet_sendmsg+0x122/0x500 [ 1414.587634] ? inet_recvmsg+0x500/0x500 [ 1414.618530] sock_sendmsg+0xce/0x110 [ 1414.622258] SYSC_sendto+0x206/0x310 [ 1414.625988] ? SYSC_connect+0x2d0/0x2d0 [ 1414.629978] ? lock_downgrade+0x6e0/0x6e0 [ 1414.634147] ? wait_for_completion+0x420/0x420 [ 1414.638829] ? __sb_end_write+0xc1/0x100 [ 1414.642889] ? fput+0xd4/0x150 [ 1414.646068] ? SyS_write+0x15e/0x230 [ 1414.649771] SyS_sendto+0x40/0x50 [ 1414.653205] ? SyS_getpeername+0x30/0x30 [ 1414.657264] do_syscall_64+0x1e8/0x640 [ 1414.661149] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1414.665999] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1414.671191] RIP: 0033:0x459829 08:42:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000001c0)=@gcm_256={{0x303}, "bfb099d9b8778b34", "1ae89642738505e283378c150a1b12c3426e1653915ef3ce3f79da069ad3851f", "0709ea7e", "e48ca9a04ad04557"}, 0x1a) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, 0xffffffffffffffff, 0x0) [ 1414.674371] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1414.682147] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1414.689398] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1414.696675] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1414.704112] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1414.711371] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:48 executing program 2 (fault-call:7 fault-nth:41): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1414.764347] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x100, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(r2, 0x3b71, &(0x7f0000000100)={0x20, 0x0, 0xa1, 0x9ab, 0x9}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1414.836615] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1414.881529] FAULT_INJECTION: forcing a failure. [ 1414.881529] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1414.915069] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1414.936365] CPU: 1 PID: 27991 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1414.943523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1414.954405] Call Trace: [ 1414.957082] dump_stack+0x138/0x19c [ 1414.960709] should_fail.cold+0x10f/0x159 [ 1414.964848] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1414.969511] ? lock_downgrade+0x6e0/0x6e0 [ 1414.973650] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1414.978657] ? check_preemption_disabled+0x3c/0x250 [ 1414.983666] alloc_pages_current+0xec/0x1e0 [ 1414.987969] ? quarantine_put+0xfa/0x1a0 [ 1414.992015] skb_page_frag_refill+0x1d3/0x3e0 [ 1414.996609] ? trace_hardirqs_on_caller+0x400/0x590 [ 1415.001639] sk_page_frag_refill+0x53/0x1c0 [ 1415.006207] alloc_sg+0x127/0x6e0 [ 1415.009654] alloc_encrypted_sg+0x8a/0x100 [ 1415.014045] ? ipv6_frag_exit+0x40/0x40 [ 1415.018185] tls_sw_sendmsg+0x902/0x1020 [ 1415.022410] ? selinux_tun_dev_create+0xc0/0xc0 [ 1415.027066] ? alloc_encrypted_sg+0x100/0x100 [ 1415.031645] ? __fget+0x237/0x370 [ 1415.035086] inet_sendmsg+0x122/0x500 [ 1415.038873] ? inet_recvmsg+0x500/0x500 [ 1415.042922] sock_sendmsg+0xce/0x110 [ 1415.046719] SYSC_sendto+0x206/0x310 [ 1415.050416] ? SYSC_connect+0x2d0/0x2d0 [ 1415.054372] ? lock_downgrade+0x6e0/0x6e0 [ 1415.058511] ? wait_for_completion+0x420/0x420 [ 1415.063075] ? __sb_end_write+0xc1/0x100 [ 1415.067120] ? fput+0xd4/0x150 [ 1415.070295] ? SyS_write+0x15e/0x230 [ 1415.073992] SyS_sendto+0x40/0x50 [ 1415.077446] ? SyS_getpeername+0x30/0x30 [ 1415.081504] do_syscall_64+0x1e8/0x640 [ 1415.085372] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1415.090207] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1415.095392] RIP: 0033:0x459829 [ 1415.099169] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1415.106860] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1415.114213] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1415.121481] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1415.128733] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1415.136076] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1415.150926] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:48 executing program 2 (fault-call:7 fault-nth:42): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1415.212567] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000300)=0x315) getsockname$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000003c0)={0x87, 0x1, 0x1, 0x0, 0x6}) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x4000)=nil, 0x4000) fcntl$setlease(r0, 0x400, 0x0) shmdt(r2) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000500)='tls\x00', 0xf3569d3394bc23b8) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r0, r0, 0x40003ffc) fallocate(r1, 0x10, 0xccd, 0x6) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x9) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e20, 0x1, @mcast2, 0x3f}}}, &(0x7f0000000080)=0x84) ioctl$VIDIOC_TRY_FMT(r3, 0xc0d05640, &(0x7f0000000400)={0x4, @sdr={0x773f775f, 0x80000001}}) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000002c0)={r4, 0x41, 0xcbb, 0x7}, &(0x7f0000000240)=0x10) 08:42:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x200000, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000200)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x1, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r3 = dup3(r0, r2, 0x0) getpeername$unix(r3, &(0x7f0000000180)=@abs, &(0x7f0000000080)=0x6e) [ 1415.269514] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1415.304992] FAULT_INJECTION: forcing a failure. [ 1415.304992] name failslab, interval 1, probability 0, space 0, times 0 [ 1415.354665] CPU: 1 PID: 28008 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1415.361814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1415.371279] Call Trace: [ 1415.373883] dump_stack+0x138/0x19c [ 1415.377539] should_fail.cold+0x10f/0x159 [ 1415.381725] should_failslab+0xdb/0x130 [ 1415.385710] __kmalloc+0x2f0/0x7a0 [ 1415.389261] ? trace_hardirqs_on_caller+0x400/0x590 [ 1415.394288] ? tls_push_record+0x10a/0x1210 [ 1415.398636] tls_push_record+0x10a/0x1210 08:42:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x100000001, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f00000001c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r2, 0x0) [ 1415.402806] tls_sw_sendmsg+0x9e8/0x1020 [ 1415.406885] ? selinux_tun_dev_create+0xc0/0xc0 [ 1415.411580] ? alloc_encrypted_sg+0x100/0x100 [ 1415.416083] ? __fget+0x237/0x370 [ 1415.419551] inet_sendmsg+0x122/0x500 [ 1415.423351] ? inet_recvmsg+0x500/0x500 [ 1415.427337] sock_sendmsg+0xce/0x110 [ 1415.431057] SYSC_sendto+0x206/0x310 [ 1415.434773] ? SYSC_connect+0x2d0/0x2d0 [ 1415.438752] ? lock_downgrade+0x6e0/0x6e0 [ 1415.442914] ? wait_for_completion+0x420/0x420 [ 1415.447500] ? __sb_end_write+0xc1/0x100 [ 1415.451567] ? fput+0xd4/0x150 [ 1415.454787] ? SyS_write+0x15e/0x230 [ 1415.458513] SyS_sendto+0x40/0x50 [ 1415.461973] ? SyS_getpeername+0x30/0x30 [ 1415.466041] do_syscall_64+0x1e8/0x640 [ 1415.469932] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1415.474865] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1415.480050] RIP: 0033:0x459829 [ 1415.483227] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1415.490918] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1415.498218] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1415.505483] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1415.512733] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1415.519983] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:48 executing program 2 (fault-call:7 fault-nth:43): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1415.555017] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1415.629308] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1415.639006] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1415.653661] FAULT_INJECTION: forcing a failure. [ 1415.653661] name failslab, interval 1, probability 0, space 0, times 0 08:42:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140), 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 1415.724191] CPU: 1 PID: 28040 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1415.731438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1415.741149] Call Trace: [ 1415.743744] dump_stack+0x138/0x19c [ 1415.747389] should_fail.cold+0x10f/0x159 [ 1415.751601] should_failslab+0xdb/0x130 [ 1415.755620] kmem_cache_alloc_node+0x287/0x780 [ 1415.760212] ? tcp_established_options+0x2c5/0x420 [ 1415.765160] __alloc_skb+0x9c/0x500 [ 1415.768794] ? skb_scrub_packet+0x4b0/0x4b0 [ 1415.773177] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1415.778294] sk_stream_alloc_skb+0xb3/0x780 [ 1415.782621] ? __sk_mem_schedule+0xa1/0xd0 [ 1415.786857] ? ipv6_frag_exit+0x40/0x40 [ 1415.790843] do_tcp_sendpages+0x7d5/0x17d0 [ 1415.795092] ? sk_stream_alloc_skb+0x780/0x780 [ 1415.799678] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 1415.804869] tls_push_sg+0x1e1/0x660 [ 1415.808625] tls_push_record+0xa4a/0x1210 [ 1415.812782] tls_sw_sendmsg+0x9e8/0x1020 [ 1415.816851] ? selinux_tun_dev_create+0xc0/0xc0 [ 1415.821530] ? alloc_encrypted_sg+0x100/0x100 [ 1415.826029] ? __fget+0x237/0x370 [ 1415.829497] inet_sendmsg+0x122/0x500 [ 1415.833306] ? inet_recvmsg+0x500/0x500 [ 1415.837282] sock_sendmsg+0xce/0x110 [ 1415.840999] SYSC_sendto+0x206/0x310 [ 1415.844711] ? SYSC_connect+0x2d0/0x2d0 [ 1415.848695] ? lock_downgrade+0x6e0/0x6e0 [ 1415.852859] ? wait_for_completion+0x420/0x420 [ 1415.857449] ? __sb_end_write+0xc1/0x100 [ 1415.861524] ? fput+0xd4/0x150 [ 1415.864721] ? SyS_write+0x15e/0x230 [ 1415.868445] SyS_sendto+0x40/0x50 [ 1415.871900] ? SyS_getpeername+0x30/0x30 [ 1415.876321] do_syscall_64+0x1e8/0x640 [ 1415.880397] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1415.890513] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1415.895779] RIP: 0033:0x459829 [ 1415.899297] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1415.906994] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1415.914362] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 08:42:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = dup3(r0, r1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f0000000240)={r3, 0x3, &(0x7f0000000100)=[0x100000000, 0x1000, 0x4], &(0x7f0000000180)=[0xffffffff, 0x5, 0xffffffffffffc69a, 0x3ff, 0x400], 0x10, 0x6, 0x1, &(0x7f00000001c0)=[0x0, 0x0, 0x4, 0x7, 0x9, 0x4], &(0x7f0000000200)=[0x8001, 0x1f, 0x9, 0x3]}) [ 1415.921634] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1415.928907] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1415.936263] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:49 executing program 2 (fault-call:7 fault-nth:44): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:49 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000180)) write$smack_current(r3, &(0x7f0000000280)='][\x00', 0x3) write$P9_RWSTAT(r1, 0x0, 0x0) [ 1415.973659] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@gcm_256={{0x303}, "458d79eccbb2b03e", "0e38e8217f8502f7cac92c1adb3a09534cfbe7270542a02012e47328022d134a", "33d52ed1", "d4dd47ac09cd09ad"}, 0xfffffe0a) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 08:42:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 1416.046934] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000000)) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000000c0)={0x5, 0x80, 0x7}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) r2 = syz_open_dev$mice(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000040)={0x0, r2, 0x1}) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000140)) [ 1416.106903] FAULT_INJECTION: forcing a failure. [ 1416.106903] name failslab, interval 1, probability 0, space 0, times 0 [ 1416.118997] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1416.176868] CPU: 0 PID: 28061 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1416.184019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1416.193391] Call Trace: [ 1416.195990] dump_stack+0x138/0x19c [ 1416.199609] should_fail.cold+0x10f/0x159 [ 1416.203748] should_failslab+0xdb/0x130 [ 1416.207881] __kmalloc+0x2f0/0x7a0 [ 1416.211534] ? tls_push_record+0xc03/0x1210 [ 1416.215839] ? trace_hardirqs_on_caller+0x400/0x590 [ 1416.220838] ? tls_push_record+0x10a/0x1210 [ 1416.225144] tls_push_record+0x10a/0x1210 [ 1416.229284] tls_sw_sendmsg+0x9e8/0x1020 [ 1416.233339] ? selinux_tun_dev_create+0xc0/0xc0 [ 1416.238012] ? alloc_encrypted_sg+0x100/0x100 [ 1416.242588] ? __fget+0x237/0x370 [ 1416.246033] inet_sendmsg+0x122/0x500 [ 1416.249813] ? inet_recvmsg+0x500/0x500 [ 1416.254227] sock_sendmsg+0xce/0x110 [ 1416.260686] SYSC_sendto+0x206/0x310 [ 1416.264568] ? SYSC_connect+0x2d0/0x2d0 [ 1416.269100] ? lock_downgrade+0x6e0/0x6e0 [ 1416.273806] ? wait_for_completion+0x420/0x420 [ 1416.278489] ? __sb_end_write+0xc1/0x100 [ 1416.283165] ? fput+0xd4/0x150 [ 1416.286850] ? SyS_write+0x15e/0x230 [ 1416.290743] SyS_sendto+0x40/0x50 [ 1416.294537] ? SyS_getpeername+0x30/0x30 [ 1416.299058] do_syscall_64+0x1e8/0x640 [ 1416.303476] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1416.308417] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1416.314325] RIP: 0033:0x459829 [ 1416.317691] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 08:42:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mountinfo\x00') ioctl$VIDIOC_QUERYCTRL(r2, 0xc0445624, &(0x7f0000000180)={0xd0, 0x2, "d3e4fece01fbc30cfd99d531ead649503aba35a9ae1dbfb2cbe7eb17d9ccb8df", 0x100000000, 0xfff, 0x7fffffff, 0x5}) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1416.327240] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1416.336343] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1416.344326] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 [ 1416.352667] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1416.362198] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 08:42:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x5057, @rand_addr="62d217f506d5707d9537959206afdde4", 0x5}, 0x1c) dup3(r0, r1, 0x0) [ 1416.432360] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:49 executing program 4: msgctl$IPC_STAT(0x0, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_elf32(r0, &(0x7f0000000600)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, 0x0, 0x38, 0x80, 0x0, 0xc927, 0x20, 0x2, 0xff}, [{0x6474e551, 0x9, 0xf266, 0x7, 0x2, 0x0, 0x2, 0x42dacd2e}, {0x3, 0x3f, 0x0, 0x0, 0x3, 0x8, 0x8}], "87b9576139a20cabbf3acb9e116b7294f651c882a37e3ff289260366ad19e905dab5fbdba3ddefbee77da7769d2defbbcba2e616b6cb8342c4e16a06f49ca383231419ac7bdcf3682239e2d5c8cc7b2b94db7944e80cc427b89b50fa5bdb7187e00691c020f442783a906053615b9500cef93afaa3c19d8e3b8b3c5559d40e6989ea0ef5d1b0859509fb9573a62d2fe6f0749d33d58203b3a7", [[]]}, 0x211) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) mknodat(0xffffffffffffffff, 0x0, 0x200, 0x0) memfd_create(&(0x7f00000003c0)='-bdevlo\x00', 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x0) clone(0x34004102, 0x0, 0x0, 0x0, 0x0) 08:42:49 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r0) [ 1416.502693] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1416.525215] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1416.585109] audit: type=1400 audit(1564821769.815:518): avc: denied { sys_admin } for pid=28088 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 08:42:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0xfffffffffffffe79) dup3(r0, r1, 0x0) 08:42:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:49 executing program 2 (fault-call:7 fault-nth:45): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) 08:42:49 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r0) [ 1416.643116] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1416.673841] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:50 executing program 5: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000180)={0x0, 0x81, 0xffffffff, &(0x7f0000000100)=0x8}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r1, r2, 0x0) [ 1416.735313] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1416.790243] net_ratelimit: 22 callbacks suppressed [ 1416.790248] protocol 88fb is buggy, dev hsr_slave_0 [ 1416.800381] protocol 88fb is buggy, dev hsr_slave_1 [ 1416.808078] FAULT_INJECTION: forcing a failure. [ 1416.808078] name failslab, interval 1, probability 0, space 0, times 0 [ 1416.836393] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1416.864880] CPU: 0 PID: 28109 Comm: syz-executor.2 Not tainted 4.14.135 #31 [ 1416.872111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1416.881473] Call Trace: [ 1416.884075] dump_stack+0x138/0x19c [ 1416.887733] should_fail.cold+0x10f/0x159 [ 1416.891897] should_failslab+0xdb/0x130 [ 1416.896044] __kmalloc+0x2f0/0x7a0 [ 1416.899581] ? trace_hardirqs_on_caller+0x400/0x590 [ 1416.899597] ? tls_push_record+0x10a/0x1210 [ 1416.909003] tls_push_record+0x10a/0x1210 [ 1416.909028] tls_sw_sendmsg+0x9e8/0x1020 [ 1416.909046] ? selinux_tun_dev_create+0xc0/0xc0 [ 1416.909062] ? alloc_encrypted_sg+0x100/0x100 [ 1416.917329] ? __fget+0x237/0x370 [ 1416.917349] inet_sendmsg+0x122/0x500 [ 1416.917360] ? inet_recvmsg+0x500/0x500 [ 1416.917372] sock_sendmsg+0xce/0x110 [ 1416.917383] SYSC_sendto+0x206/0x310 [ 1416.917395] ? SYSC_connect+0x2d0/0x2d0 [ 1416.928888] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1416.930075] ? lock_downgrade+0x6e0/0x6e0 [ 1416.930100] ? wait_for_completion+0x420/0x420 [ 1416.930114] ? __sb_end_write+0xc1/0x100 [ 1416.937871] ? fput+0xd4/0x150 [ 1416.937884] ? SyS_write+0x15e/0x230 [ 1416.937902] SyS_sendto+0x40/0x50 [ 1416.937912] ? SyS_getpeername+0x30/0x30 08:42:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1416.937926] do_syscall_64+0x1e8/0x640 [ 1416.960807] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1416.960829] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1416.960837] RIP: 0033:0x459829 [ 1416.960842] RSP: 002b:00007ff5268d5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1416.960852] RAX: ffffffffffffffda RBX: 00007ff5268d5c90 RCX: 0000000000459829 [ 1416.960858] RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1416.960865] RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 08:42:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) ioctl(0xffffffffffffffff, 0x8912, 0x0) open(0x0, 0x10000, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r1, 0xa, 0x3) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 08:42:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x160, 0x4000000, 0x0, 0xfffffffffffffecf) dup3(r0, r1, 0x0) [ 1416.960870] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff5268d66d4 [ 1416.960875] R13: 00000000004c77d9 R14: 00000000004dcf90 R15: 0000000000000005 [ 1417.079921] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:42:50 executing program 2 (fault-call:7 fault-nth:46): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r0, r1, 0x0) [ 1417.083754] refcount_t: increment on 0; use-after-free. [ 1417.104099] ------------[ cut here ]------------ [ 1417.108910] WARNING: CPU: 1 PID: 28118 at lib/refcount.c:153 refcount_inc.cold+0x18/0x1f [ 1417.111946] kobject: 'loop0' (ffff8880a49d8660): kobject_uevent_env [ 1417.117169] Kernel panic - not syncing: panic_on_warn set ... [ 1417.117169] [ 1417.117183] CPU: 1 PID: 28118 Comm: syz-executor.4 Not tainted 4.14.135 #31 [ 1417.117189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1417.117194] Call Trace: [ 1417.117214] dump_stack+0x138/0x19c [ 1417.117230] panic+0x1f2/0x426 [ 1417.127320] kobject: 'loop0' (ffff8880a49d8660): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1417.130990] ? add_taint.cold+0x16/0x16 [ 1417.131007] ? refcount_inc.cold+0x18/0x1f [ 1417.131015] ? __warn.cold+0x14/0x36 [ 1417.131024] ? refcount_inc.cold+0x18/0x1f [ 1417.131030] __warn.cold+0x2f/0x36 [ 1417.131041] ? ist_end_non_atomic+0x10/0x10 08:42:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x100, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000100), 0x4) dup3(r0, r1, 0x0) [ 1417.131049] ? refcount_inc.cold+0x18/0x1f [ 1417.131064] report_bug+0x216/0x254 [ 1417.131076] do_error_trap+0x1bb/0x310 [ 1417.131086] ? math_error+0x360/0x360 [ 1417.131097] ? vprintk_emit+0x21c/0x600 [ 1417.131107] ? vprintk_emit+0x171/0x600 [ 1417.143457] kobject: 'loop5' (ffff8880a4b62220): kobject_uevent_env [ 1417.147648] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1417.147665] do_invalid_op+0x1b/0x20 [ 1417.147678] invalid_op+0x1b/0x40 [ 1417.158406] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1417.166797] RIP: 0010:refcount_inc.cold+0x18/0x1f [ 1417.166804] RSP: 0018:ffff88804ee4f9c0 EFLAGS: 00010286 [ 1417.166814] RAX: 000000000000002b RBX: ffffffff86fac020 RCX: 0000000000000000 [ 1417.166821] RDX: 0000000000020e6b RSI: ffffffff814b1975 RDI: ffffed1009dc9f2e [ 1417.166827] RBP: ffff88804ee4f9c8 R08: 000000000000002b R09: ffff88804d350f88 [ 1417.166832] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a7d43538 [ 1417.166836] R13: 0000000000000000 R14: ffff8880a7d43500 R15: ffff8880645e5ea0 [ 1417.166856] ? vprintk_func+0x65/0x159 [ 1417.166873] kobject_get+0x5b/0x70 [ 1417.166882] kobject_add_internal.part.0+0xfc/0x340 [ 1417.166894] ? kfree_const+0x40/0x50 [ 1417.198484] kobject: 'loop5' (ffff8880a4b62220): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1417.198774] kobject_add+0x11f/0x180 [ 1417.216172] kobject: 'loop2' (ffff8880a4a8a960): kobject_uevent_env [ 1417.220757] ? kset_create_and_add+0x180/0x180 [ 1417.220772] ? get_device_parent.isra.0+0x34e/0x560 [ 1417.220787] ? kmem_cache_alloc_trace+0x623/0x790 [ 1417.220797] ? lock_downgrade+0x6e0/0x6e0 [ 1417.220812] get_device_parent.isra.0+0x415/0x560 [ 1417.220822] device_add+0x2d3/0x1490 [ 1417.220832] ? device_initialize+0x430/0x430 [ 1417.220842] ? device_private_init+0x190/0x190 [ 1417.226764] kobject: 'loop2' (ffff8880a4a8a960): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1417.229382] ? up_write+0x1a/0x60 [ 1417.229400] hci_register_dev+0x2d9/0x810 [ 1417.229410] ? hci_init_sysfs+0x7c/0xa0 [ 1417.229425] __vhci_create_device+0x2a6/0x560 [ 1417.229436] vhci_write+0x2a1/0x437 [ 1417.255681] kobject: 'loop1' (ffff8880a4a2ef60): kobject_uevent_env [ 1417.260677] __vfs_write+0x4a7/0x6b0 [ 1417.260692] ? kernel_read+0x120/0x120 [ 1417.260711] ? rw_verify_area+0xea/0x2b0 [ 1417.260721] vfs_write+0x198/0x500 [ 1417.260733] SyS_write+0xfd/0x230 [ 1417.260742] ? SyS_read+0x230/0x230 [ 1417.260753] ? do_syscall_64+0x53/0x640 [ 1417.260763] ? SyS_read+0x230/0x230 [ 1417.260772] do_syscall_64+0x1e8/0x640 [ 1417.260782] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1417.275503] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1417.282593] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1417.282603] RIP: 0033:0x459829 [ 1417.282607] RSP: 002b:00007f267f654c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1417.282616] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 1417.282621] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000003 [ 1417.282626] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1417.282630] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f267f6556d4 [ 1417.282636] R13: 00000000004c9b0d R14: 00000000004e1178 R15: 00000000ffffffff [ 1417.291291] Kernel Offset: disabled [ 1417.503948] Rebooting in 86400 seconds..