r.ljk7lG/1592/file0" dev="sda1" ino=16894 res=1 [ 939.067600] QAT: Stopping all acceleration devices. [ 939.083427] audit: type=1804 audit(1540926213.346:4681): pid=21634 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1592/file0" dev="sda1" ino=16894 res=1 19:03:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) socket$kcm(0x29, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7, 0x2040) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) 19:03:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x206, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:33 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000040)) 19:03:33 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0xa00}) 19:03:33 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}) [ 939.521712] audit: type=1326 audit(1540926213.786:4682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21603 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 939.610884] net_ratelimit: 1 callbacks suppressed [ 939.610896] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 939.641834] QAT: Stopping all acceleration devices. 19:03:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) socketpair$unix(0x1, 0x40000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r2, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) [ 939.665837] audit: type=1326 audit(1540926213.926:4683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21651 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:03:34 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}) 19:03:34 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000040)) [ 939.716090] audit: type=1804 audit(1540926213.956:4684): pid=21641 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1593/file0" dev="sda1" ino=16923 res=1 19:03:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1b7, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 939.816241] QAT: Stopping all acceleration devices. [ 939.821747] audit: type=1804 audit(1540926214.006:4685): pid=21654 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1593/file0" dev="sda1" ino=16923 res=1 19:03:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) socketpair$unix(0x1, 0x40000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r2, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) 19:03:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1b2, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 939.947185] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:34 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000040)) 19:03:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc7f0000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:34 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "0000000000000000000000000300"}) 19:03:34 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0xffffff7f}) 19:03:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1ce, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) socketpair$unix(0x1, 0x40000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r2, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) 19:03:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) socketpair$unix(0x1, 0x40000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 19:03:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1e6, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 940.544021] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 940.565698] QAT: Stopping all acceleration devices. 19:03:34 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "000000000000000000000000fdfdffff"}) 19:03:34 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)=r0) 19:03:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) socketpair$unix(0x1, 0x40000000005, 0x0, &(0x7f00000000c0)) [ 940.702692] QAT: Stopping all acceleration devices. 19:03:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xc7, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 940.857294] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) 19:03:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:35 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "0000000000000000000000000400"}) 19:03:35 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x6800}) 19:03:35 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000040)=r0) 19:03:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x87, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:35 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "00000000000000000000000000000005"}) 19:03:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1a5, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 941.473206] QAT: Stopping all acceleration devices. [ 941.490545] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:35 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000040)=r0) 19:03:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) accept$alg(r0, 0x0, 0x0) [ 941.559735] QAT: Stopping all acceleration devices. 19:03:35 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "000000000000000000000000fffffdfd"}) 19:03:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) [ 941.711024] QAT: Stopping all acceleration devices. [ 941.822270] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1c0, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:36 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000040)=r0) 19:03:36 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0xe400000000000000}) 19:03:36 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "000000000000000000000000000600"}) 19:03:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) [ 942.361654] QAT: Stopping all acceleration devices. [ 942.364211] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:36 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) 19:03:36 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)) 19:03:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x105, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 942.531129] QAT: Stopping all acceleration devices. 19:03:36 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) 19:03:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:36 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "00000000000000000000000000000300"}) [ 942.681356] QAT: Stopping all acceleration devices. [ 942.693311] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:37 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x6c00000000000000}) 19:03:37 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)) 19:03:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x22e, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:37 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "000000000000000000000000000300"}) 19:03:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) 19:03:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 943.294158] QAT: Stopping all acceleration devices. [ 943.306555] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:37 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:37 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) 19:03:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1bd, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:37 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)) [ 943.453908] QAT: Stopping all acceleration devices. 19:03:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) socketpair$unix(0x1, 0x40000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 943.592870] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 943.633370] kauditd_printk_skb: 24 callbacks suppressed [ 943.633386] audit: type=1804 audit(1540926217.896:4710): pid=21854 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1602/file0" dev="sda1" ino=16918 res=1 [ 943.703959] audit: type=1804 audit(1540926217.966:4711): pid=21861 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1602/file0" dev="sda1" ino=16918 res=1 19:03:38 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x7000000}) 19:03:38 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x0, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) 19:03:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x10e, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) socketpair$unix(0x1, 0x40000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 19:03:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 944.128303] audit: type=1326 audit(1540926218.386:4712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21832 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 944.225678] QAT: Stopping all acceleration devices. 19:03:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x0, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) 19:03:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xb6, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 944.266195] audit: type=1804 audit(1540926218.526:4713): pid=21869 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1603/file0" dev="sda1" ino=16970 res=1 19:03:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) socketpair$unix(0x1, 0x40000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 19:03:38 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 944.352307] audit: type=1326 audit(1540926218.566:4714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21876 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:03:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x0, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) [ 944.445450] audit: type=1804 audit(1540926218.606:4715): pid=21881 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1603/file0" dev="sda1" ino=16970 res=1 [ 944.460283] QAT: Stopping all acceleration devices. [ 944.607432] audit: type=1804 audit(1540926218.866:4716): pid=21899 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1604/file0" dev="sda1" ino=16949 res=1 [ 944.673215] audit: type=1804 audit(1540926218.936:4717): pid=21901 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1604/file0" dev="sda1" ino=16949 res=1 19:03:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x229, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:39 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:39 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) socketpair$unix(0x1, 0x40000000005, 0x0, &(0x7f00000000c0)) 19:03:39 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}) 19:03:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 945.066039] audit: type=1326 audit(1540926219.326:4718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21876 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 945.172714] QAT: Stopping all acceleration devices. [ 945.186119] QAT: Stopping all acceleration devices. 19:03:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc7f0000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:39 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}) 19:03:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x13a, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 945.229740] net_ratelimit: 2 callbacks suppressed [ 945.229753] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 945.245611] audit: type=1326 audit(1540926219.506:4719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=21917 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:03:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) [ 945.339675] QAT: Stopping all acceleration devices. 19:03:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) accept$alg(r0, 0x0, 0x0) 19:03:39 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "00000000000000000000000000000600"}) [ 945.444019] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 945.510604] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 945.557383] QAT: Stopping all acceleration devices. 19:03:40 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x183, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) 19:03:40 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "000000000000000000000000000600"}) 19:03:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc7f0000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1802]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 946.138420] QAT: Stopping all acceleration devices. 19:03:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x7, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:40 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) [ 946.181643] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 946.186238] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) 19:03:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000040), 0xd1) close(r5) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) 19:03:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x82, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 946.395886] QAT: Stopping all acceleration devices. [ 946.519286] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:41 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "000000000000000000000000007fffff"}) 19:03:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x142800]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) 19:03:41 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x30, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000040), 0xd1) close(r5) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) [ 947.086858] QAT: Stopping all acceleration devices. 19:03:41 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 947.109177] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:41 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) 19:03:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x174, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 947.203126] QAT: Stopping all acceleration devices. 19:03:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000040), 0xd1) close(r5) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) 19:03:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:41 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) [ 947.359278] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 947.376125] QAT: Stopping all acceleration devices. 19:03:42 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1c7, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:42 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000040), 0xd1) close(r5) 19:03:42 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) 19:03:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 948.039435] QAT: Stopping all acceleration devices. [ 948.053859] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x0, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) 19:03:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x19c, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:42 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) close(r5) 19:03:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x0, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) 19:03:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 948.220624] QAT: Stopping all acceleration devices. [ 948.343523] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:43 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x17f, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:43 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}) 19:03:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) close(r5) 19:03:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @empty, [0xfdfdffff]}, {}, 0x0, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) 19:03:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 948.852250] kauditd_printk_skb: 22 callbacks suppressed [ 948.852266] audit: type=1326 audit(1540926223.116:4742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22048 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:03:43 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 948.965443] QAT: Stopping all acceleration devices. [ 948.980211] audit: type=1326 audit(1540926223.236:4743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22088 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:03:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) close(r5) 19:03:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000040), 0xd1) close(r5) [ 949.061339] audit: type=1804 audit(1540926223.286:4744): pid=22084 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1613/file0" dev="sda1" ino=17057 res=1 19:03:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1900000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x7d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 949.129993] QAT: Stopping all acceleration devices. 19:03:43 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 949.181180] audit: type=1804 audit(1540926223.346:4745): pid=22093 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1613/file0" dev="sda1" ino=17057 res=1 [ 949.249169] QAT: Stopping all acceleration devices. [ 949.289225] audit: type=1804 audit(1540926223.546:4746): pid=22110 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1614/file0" dev="sda1" ino=16988 res=1 [ 949.359613] audit: type=1804 audit(1540926223.606:4747): pid=22113 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1614/file0" dev="sda1" ino=16988 res=1 [ 949.778479] audit: type=1326 audit(1540926224.036:4748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22088 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:03:44 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0xd1) close(0xffffffffffffffff) 19:03:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000040), 0xd1) close(r5) 19:03:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1e4, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:44 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 949.853907] audit: type=1326 audit(1540926224.116:4749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22119 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 949.899064] QAT: Stopping all acceleration devices. 19:03:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x14c, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000040), 0xd1) close(r5) 19:03:44 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}) 19:03:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000040), 0xd1) close(r5) [ 949.978668] audit: type=1804 audit(1540926224.236:4750): pid=22128 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1615/file0" dev="sda1" ino=17313 res=1 [ 950.070908] audit: type=1804 audit(1540926224.316:4751): pid=22140 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1615/file0" dev="sda1" ino=17313 res=1 [ 950.102798] QAT: Stopping all acceleration devices. 19:03:44 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "00000000000000000000000000fdfdff"}) 19:03:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 950.247595] QAT: Stopping all acceleration devices. [ 950.250384] net_ratelimit: 3 callbacks suppressed [ 950.250397] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:44 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000040), 0xd1) close(r5) 19:03:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x190, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) close(r5) 19:03:44 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 950.757922] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 950.769471] QAT: Stopping all acceleration devices. [ 950.775524] QAT: Stopping all acceleration devices. 19:03:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) close(r5) 19:03:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1c3, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000040), 0xd1) close(r5) 19:03:45 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r4, &(0x7f0000000040), 0xd1) close(r4) 19:03:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 950.979088] QAT: Stopping all acceleration devices. [ 951.072445] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:45 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x55, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:45 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}) 19:03:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) close(r5) 19:03:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) 19:03:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x51, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 951.705788] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 951.728835] QAT: Stopping all acceleration devices. 19:03:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0xd1) close(0xffffffffffffffff) 19:03:46 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) 19:03:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1f3, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 951.901938] QAT: Stopping all acceleration devices. 19:03:46 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 952.049065] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 952.070243] QAT: Stopping all acceleration devices. 19:03:46 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000040), 0xd1) close(r5) 19:03:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x3b, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) 19:03:46 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 952.680475] QAT: Stopping all acceleration devices. 19:03:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000040), 0xd1) close(r5) 19:03:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x26, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:47 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) [ 952.757273] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r3, &(0x7f0000000300)=[{&(0x7f0000000240)="df8d673e92b61fb133c8aad42efb5261435b561e329d5b9f8097738e0748926d90d2e51e7af8748bf47e718d2ffe80b1ef6295c8f66bbed6e0cb0acbd9bce7eecdef29f27c87afeb170f116c858a5eab1bde98011e7881ac37599080f0a5c923ba8b8b4c03a62105044a6cee9f1fd9858ff1a5f97cf3726a0aad510b4ac8d5c38fe34bfc6ea5bf5970c8421305fb1578b26550e2c339440dab642060f9f876e1410c1e07856cb4c0511069", 0xab}, {&(0x7f00000000c0)="d732", 0x2}], 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000040), 0xd1) close(r5) [ 952.869311] QAT: Stopping all acceleration devices. 19:03:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x178, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:47 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r4, &(0x7f0000000040), 0xd1) close(r4) 19:03:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1f4, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) 19:03:47 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "00000000000000000000000000fffffd"}) [ 953.634739] QAT: Stopping all acceleration devices. 19:03:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xb8, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) 19:03:47 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) [ 953.713312] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 953.795676] QAT: Stopping all acceleration devices. 19:03:48 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x23b, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78afc]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 953.951825] QAT: Stopping all acceleration devices. [ 954.035452] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 954.058896] kauditd_printk_skb: 22 callbacks suppressed [ 954.058911] audit: type=1804 audit(1540926228.316:4774): pid=22324 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1623/file0" dev="sda1" ino=17153 res=1 [ 954.107065] audit: type=1804 audit(1540926228.366:4775): pid=22328 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1623/file0" dev="sda1" ino=17153 res=1 [ 954.442797] audit: type=1326 audit(1540926228.706:4776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22295 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:03:48 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) 19:03:48 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) 19:03:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x171, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x218]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:48 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "00000000000000000000000000000500"}) [ 954.527525] QAT: Stopping all acceleration devices. [ 954.533215] audit: type=1326 audit(1540926228.796:4777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22331 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:03:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xaa, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 954.648036] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 954.678865] QAT: Stopping all acceleration devices. 19:03:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) 19:03:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xd, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:49 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "000000000000000000000000000500"}) [ 954.717003] audit: type=1804 audit(1540926228.976:4778): pid=22353 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1624/file0" dev="sda1" ino=17169 res=1 19:03:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) [ 954.800920] audit: type=1804 audit(1540926229.056:4779): pid=22353 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1624/file0" dev="sda1" ino=17169 res=1 [ 954.848523] QAT: Stopping all acceleration devices. [ 955.329698] audit: type=1326 audit(1540926229.586:4780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22331 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:03:49 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1ac, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:49 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "000000000000000000000000000200"}) 19:03:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) 19:03:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) [ 955.446180] QAT: Stopping all acceleration devices. 19:03:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x92, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 955.471699] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 955.482438] audit: type=1326 audit(1540926229.736:4781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22380 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:03:49 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) [ 955.535746] audit: type=1804 audit(1540926229.796:4782): pid=22379 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1625/file0" dev="sda1" ino=17777 res=1 19:03:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) accept$alg(r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000040), 0xd1) close(r2) [ 955.596750] QAT: Stopping all acceleration devices. 19:03:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xca, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 955.698832] audit: type=1804 audit(1540926229.876:4783): pid=22396 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1625/file0" dev="sda1" ino=17777 res=1 [ 955.766131] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:50 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xd3, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000040), 0xd1) close(r2) 19:03:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) 19:03:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40020000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:50 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "000000000000000000000000000400"}) [ 956.364320] QAT: Stopping all acceleration devices. 19:03:50 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) 19:03:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1b9, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000040), 0xd1) close(r2) [ 956.425373] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) [ 956.488448] QAT: Stopping all acceleration devices. 19:03:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:50 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "00000000000000000000000000000500"}) 19:03:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xab, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 956.650991] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 956.694935] QAT: Stopping all acceleration devices. 19:03:51 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1df, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8010017d]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:51 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "00000000000000000000000000000400"}) 19:03:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) 19:03:51 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) [ 957.307909] QAT: Stopping all acceleration devices. 19:03:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x115, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:51 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 957.340436] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xfd, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) [ 957.462797] QAT: Stopping all acceleration devices. 19:03:51 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`'}) 19:03:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) 19:03:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 957.608447] QAT: Stopping all acceleration devices. [ 957.633624] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:52 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:03:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x94, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:52 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:52 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "00000000000000000000000000000003"}) 19:03:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) accept$alg(r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000040), 0xd1) close(r2) 19:03:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xeb, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 958.299470] QAT: Stopping all acceleration devices. 19:03:52 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "0000000000000000000000000000ffff"}) 19:03:52 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) [ 958.324925] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1f1, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000040), 0xd1) close(r2) 19:03:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14280000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 958.491246] QAT: Stopping all acceleration devices. 19:03:52 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) [ 958.605158] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x2b, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:53 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000040), 0xd1) close(r2) 19:03:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0xd1) close(r0) 19:03:53 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "00000000000000000000000000000005"}) 19:03:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 959.109594] kauditd_printk_skb: 20 callbacks suppressed [ 959.109609] audit: type=1326 audit(1540926233.366:4804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22512 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:03:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xb3, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 959.240058] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 959.251618] QAT: Stopping all acceleration devices. [ 959.268446] audit: type=1326 audit(1540926233.526:4805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22557 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:03:53 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}) 19:03:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0xd1) close(r0) [ 959.326737] audit: type=1804 audit(1540926233.586:4806): pid=22556 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1633/file0" dev="sda1" ino=17841 res=1 19:03:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xf7, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:53 executing program 3: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:03:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc8a0700]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 959.450516] audit: type=1804 audit(1540926233.636:4807): pid=22572 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1633/file0" dev="sda1" ino=17841 res=1 [ 959.485070] QAT: Stopping all acceleration devices. 19:03:53 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "00000000000000000000000000000200"}) [ 959.630497] QAT: Stopping all acceleration devices. [ 959.656849] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 959.680304] audit: type=1804 audit(1540926233.936:4808): pid=22588 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1634/file0" dev="sda1" ino=17841 res=1 [ 959.754059] audit: type=1804 audit(1540926234.016:4809): pid=22593 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1634/file0" dev="sda1" ino=17841 res=1 19:03:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x187, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0xd1) close(r0) 19:03:54 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:03:54 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 960.065594] audit: type=1326 audit(1540926234.326:4810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22557 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 960.157998] QAT: Stopping all acceleration devices. 19:03:54 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x3, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 960.234947] audit: type=1326 audit(1540926234.496:4811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22604 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:03:54 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:03:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:03:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x121, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 960.336521] audit: type=1804 audit(1540926234.526:4812): pid=22605 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1635/file0" dev="sda1" ino=18273 res=1 [ 960.379229] QAT: Stopping all acceleration devices. 19:03:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:03:54 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 960.430146] audit: type=1804 audit(1540926234.576:4813): pid=22619 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1635/file0" dev="sda1" ino=18273 res=1 [ 960.565302] QAT: Stopping all acceleration devices. 19:03:55 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fdc]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xe, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:55 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:03:55 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) [ 961.154299] QAT: Stopping all acceleration devices. 19:03:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xfc, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:55 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 961.184629] net_ratelimit: 1 callbacks suppressed [ 961.184642] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:03:55 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:03:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24c, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 961.341588] QAT: Stopping all acceleration devices. 19:03:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8010017d00000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 961.483840] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:03:56 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x147, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:56 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0xd1) close(r0) 19:03:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) [ 962.133704] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 962.152215] QAT: Stopping all acceleration devices. 19:03:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x17d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0xd1) close(r0) 19:03:56 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:03:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xf1, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 962.371029] QAT: Stopping all acceleration devices. [ 962.429271] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:57 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:57 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0xd1) close(r0) 19:03:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:03:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1ad, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 963.101507] QAT: Stopping all acceleration devices. 19:03:57 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a'}) 19:03:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x23e, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 963.123964] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) [ 963.227367] QAT: Stopping all acceleration devices. 19:03:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1802000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:03:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x43, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 963.417538] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:03:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:03:58 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:58 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x90, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) [ 964.075128] QAT: Stopping all acceleration devices. 19:03:58 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x69, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) [ 964.118527] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 964.123453] kauditd_printk_skb: 19 callbacks suppressed [ 964.123468] audit: type=1326 audit(1540926238.376:4833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22773 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 964.211114] audit: type=1804 audit(1540926238.466:4834): pid=22777 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1642/file0" dev="sda1" ino=17043 res=1 19:03:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:03:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x191, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 964.284689] QAT: Stopping all acceleration devices. [ 964.319767] audit: type=1804 audit(1540926238.546:4835): pid=22791 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1642/file0" dev="sda1" ino=17043 res=1 19:03:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x236, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 964.487593] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 964.525554] audit: type=1804 audit(1540926238.786:4836): pid=22805 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1643/file0" dev="sda1" ino=17042 res=1 [ 964.573795] audit: type=1804 audit(1540926238.836:4837): pid=22808 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1643/file0" dev="sda1" ino=17042 res=1 19:03:59 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:03:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:03:59 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:03:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1fd, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 964.919831] audit: type=1326 audit(1540926239.176:4838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22773 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 965.020708] QAT: Stopping all acceleration devices. [ 965.058729] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:03:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x137, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:03:59 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) [ 965.092307] audit: type=1326 audit(1540926239.356:4839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22819 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:03:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0xd1) close(r1) [ 965.166104] QAT: Stopping all acceleration devices. [ 965.186155] audit: type=1804 audit(1540926239.406:4840): pid=22822 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1644/file0" dev="sda1" ino=18394 res=1 19:03:59 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:03:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x281400]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 965.268474] audit: type=1804 audit(1540926239.476:4841): pid=22834 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1644/file0" dev="sda1" ino=18394 res=1 [ 965.375071] QAT: Stopping all acceleration devices. [ 965.387142] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 965.441089] audit: type=1804 audit(1540926239.696:4842): pid=22846 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1645/file0" dev="sda1" ino=18382 res=1 19:04:00 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:04:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xb4, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0xd1) close(r1) 19:04:00 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 966.018326] QAT: Stopping all acceleration devices. 19:04:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:04:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0xd1) close(r1) 19:04:00 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x93, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:04:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 966.219301] QAT: Stopping all acceleration devices. [ 966.359474] net_ratelimit: 1 callbacks suppressed [ 966.359484] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(0xffffffffffffffff) 19:04:01 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x207, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:01 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "00000000000000000000000000000006"}) 19:04:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:04:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 966.941907] QAT: Stopping all acceleration devices. 19:04:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x7b, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:01 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 966.974551] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fsync(r0) 19:04:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:04:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x20a, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 967.142692] QAT: Stopping all acceleration devices. 19:04:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc8a070000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:01 executing program 0: socket(0x11, 0x0, 0x0) [ 967.310386] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:04:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:02 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:02 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xcb, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:02 executing program 0: mknod(&(0x7f0000000100)='./file0\x00', 0x80aa, 0x6125) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) ioctl$TIOCNXCL(r0, 0x2000740e) 19:04:02 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 967.946908] QAT: Stopping all acceleration devices. [ 967.959370] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x228, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) 19:04:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x0, 0x0, 0xffffffffffffff34) 19:04:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 968.129803] QAT: Stopping all acceleration devices. 19:04:02 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "00000000000000000000000000007fff"}) 19:04:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xe7, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 968.235339] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 968.328035] QAT: Stopping all acceleration devices. 19:04:03 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:03 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0xd1) close(r1) 19:04:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x42, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:03 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 968.881855] QAT: Stopping all acceleration devices. 19:04:03 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 '}) 19:04:03 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 968.936301] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0xd1) close(r1) 19:04:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x9c, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 969.044985] QAT: Stopping all acceleration devices. 19:04:03 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "0000000000000000000000000000fdfd"}) [ 969.164391] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 969.201412] kauditd_printk_skb: 23 callbacks suppressed [ 969.201428] audit: type=1804 audit(1540926243.466:4866): pid=23021 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1653/file0" dev="sda1" ino=18430 res=1 [ 969.237205] QAT: Stopping all acceleration devices. [ 969.269675] audit: type=1804 audit(1540926243.506:4867): pid=23025 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1653/file0" dev="sda1" ino=18430 res=1 19:04:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0xd1) close(r1) 19:04:04 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x37, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:04 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:04 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 969.719902] audit: type=1326 audit(1540926243.976:4868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22994 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 969.855380] QAT: Stopping all acceleration devices. [ 969.865160] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:04 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?'}) 19:04:04 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1c2, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 969.904697] audit: type=1326 audit(1540926244.166:4869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23039 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:04:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(0xffffffffffffffff) [ 969.986308] audit: type=1804 audit(1540926244.206:4870): pid=23046 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1654/file0" dev="sda1" ino=18451 res=1 19:04:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x14a, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 970.092816] QAT: Stopping all acceleration devices. [ 970.099280] audit: type=1804 audit(1540926244.246:4871): pid=23047 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1654/file0" dev="sda1" ino=18451 res=1 19:04:04 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "00000000000000000000000000000600"}) [ 970.206102] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 970.269480] audit: type=1804 audit(1540926244.526:4872): pid=23063 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1655/file0" dev="sda1" ino=18439 res=1 [ 970.300706] QAT: Stopping all acceleration devices. [ 970.352102] audit: type=1804 audit(1540926244.616:4873): pid=23075 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1655/file0" dev="sda1" ino=18439 res=1 19:04:05 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:05 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x162, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:05 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) 19:04:05 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) getsockname$unix(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000240)=0x6e) finit_module(r3, &(0x7f0000000140)='wlan0cpu$et%\x00', 0x2) creat(&(0x7f0000000080)='./file0\x00', 0x1a) [ 970.699823] audit: type=1326 audit(1540926244.956:4874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23039 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:04:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 970.793944] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x130, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 970.845334] audit: type=1804 audit(1540926245.106:4875): pid=23080 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1656/file0" dev="sda1" ino=18458 res=1 [ 970.881312] QAT: Stopping all acceleration devices. 19:04:05 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:05 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "00000000000000000000000000000300"}) 19:04:05 executing program 3: mknod(&(0x7f00000015c0)='./file0\x00', 0x8, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000b40)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_script(r0, &(0x7f0000000340)={'#! ', './file1'}, 0xb) 19:04:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1d9, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 971.116214] QAT: Stopping all acceleration devices. 19:04:06 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:06 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:06 executing program 3: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0x68, &(0x7f00000000c0), 0x3c) pipe2(&(0x7f0000000040), 0x0) 19:04:06 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d011080]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:06 executing program 3: clone(0x80104, &(0x7f00000001c0), &(0x7f00000002c0), &(0x7f0000000280), &(0x7f0000000440)) [ 971.853656] QAT: Stopping all acceleration devices. [ 971.861995] net_ratelimit: 1 callbacks suppressed [ 971.862006] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:06 executing program 0: read(0xffffffffffffffff, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x5a, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:06 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`'}) 19:04:06 executing program 3: msgget(0x1, 0x204) 19:04:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:06 executing program 0: read(0xffffffffffffffff, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 972.061387] QAT: Stopping all acceleration devices. [ 972.185159] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:07 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:07 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:07 executing program 3: getpeername(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0x6e) 19:04:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x10f, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:07 executing program 0: read(0xffffffffffffffff, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 972.785864] QAT: Stopping all acceleration devices. 19:04:07 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:07 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:07 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2d) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x1, &(0x7f0000000140), 0xc) [ 972.860551] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xb2, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 972.949319] QAT: Stopping all acceleration devices. 19:04:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc7f]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:07 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:07 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 973.146573] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 973.171205] QAT: Stopping all acceleration devices. 19:04:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xf8, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:08 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2f) bind$inet(r0, &(0x7f0000000040), 0xc) 19:04:08 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:08 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "00000000000000000000000000000005"}) 19:04:08 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 973.793385] QAT: Stopping all acceleration devices. 19:04:08 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(0xffffffffffffffff, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:08 executing program 3: 19:04:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x1ae, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 973.842825] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:08 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "00000000000000000000000000000002"}) 19:04:08 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(0xffffffffffffffff, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0xc5, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 974.019738] QAT: Stopping all acceleration devices. [ 974.148767] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 974.238224] kauditd_printk_skb: 21 callbacks suppressed [ 974.238239] audit: type=1804 audit(1540926248.496:4897): pid=23262 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1663/file0" dev="sda1" ino=17083 res=1 19:04:09 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "00000000000000000000000000000003"}) 19:04:09 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:09 executing program 3: 19:04:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x24d}, 0x0) 19:04:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18020000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:09 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(0xffffffffffffffff, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 974.676194] audit: type=1326 audit(1540926248.936:4898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23233 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 974.823685] QAT: Stopping all acceleration devices. 19:04:09 executing program 3: 19:04:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0xfffffff0}, 0x0) 19:04:09 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 974.846607] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 974.858620] audit: type=1326 audit(1540926249.106:4899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23271 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:04:09 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 974.959573] audit: type=1804 audit(1540926249.166:4900): pid=23276 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1664/file0" dev="sda1" ino=18513 res=1 19:04:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1900]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0xf0ffffff00000000}, 0x0) 19:04:09 executing program 3: [ 975.045793] QAT: Stopping all acceleration devices. [ 975.053891] audit: type=1804 audit(1540926249.216:4901): pid=23286 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1664/file0" dev="sda1" ino=18513 res=1 [ 975.148116] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 975.222481] audit: type=1804 audit(1540926249.486:4902): pid=23298 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1665/file0" dev="sda1" ino=18503 res=1 [ 975.285131] audit: type=1804 audit(1540926249.546:4903): pid=23307 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1665/file0" dev="sda1" ino=18503 res=1 19:04:09 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:09 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:09 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:09 executing program 3: 19:04:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x700}, 0x0) 19:04:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 975.644624] audit: type=1326 audit(1540926249.906:4904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23271 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 975.751977] QAT: Stopping all acceleration devices. 19:04:10 executing program 3: accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x2, 0x0, @rand_addr}, &(0x7f0000000280)=0x10, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/xfrm_stat\x00') ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000000080)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) close(r0) 19:04:10 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 975.773098] audit: type=1326 audit(1540926250.036:4905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23319 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 975.791934] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x7f00}, 0x0) 19:04:10 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 975.871031] audit: type=1804 audit(1540926250.096:4906): pid=23320 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1666/file0" dev="sda1" ino=17078 res=1 [ 975.916537] QAT: Stopping all acceleration devices. 19:04:10 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 976.029834] QAT: Stopping all acceleration devices. [ 976.089713] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:10 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:10 executing program 3: 19:04:10 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x7fffdd2d}, 0x0) 19:04:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:10 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:10 executing program 3: [ 976.701989] QAT: Stopping all acceleration devices. 19:04:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x700000000000000}, 0x0) 19:04:11 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:11 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "00000000000000000000000000000006"}) 19:04:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 976.934208] QAT: Stopping all acceleration devices. 19:04:11 executing program 3: [ 976.966632] net_ratelimit: 1 callbacks suppressed [ 976.966646] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:12 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:12 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:12 executing program 3: 19:04:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x2dddff7f00000000}, 0x0) 19:04:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc7f000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:12 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 977.907581] QAT: Stopping all acceleration devices. 19:04:12 executing program 3: 19:04:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0xf0ffffff7f0000}, 0x0) [ 977.928219] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:12 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:12 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:12 executing program 3: 19:04:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 978.082293] QAT: Stopping all acceleration devices. 19:04:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x100000000000000}, 0x0) [ 978.209231] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:13 executing program 3: 19:04:13 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:13 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:13 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x8dffffff00000000}, 0x0) 19:04:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:13 executing program 3: [ 978.849431] QAT: Stopping all acceleration devices. [ 978.863154] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0xd0020000}, 0x0) 19:04:13 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:13 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:13 executing program 3: [ 979.039814] QAT: Stopping all acceleration devices. 19:04:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:13 executing program 3: [ 979.195825] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 979.262291] kauditd_printk_skb: 20 callbacks suppressed [ 979.262306] audit: type=1804 audit(1540926253.526:4927): pid=23474 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1673/file0" dev="sda1" ino=16785 res=1 19:04:14 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x2}, 0x0) 19:04:14 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:14 executing program 3: 19:04:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:14 executing program 0: [ 979.678547] audit: type=1326 audit(1540926253.936:4928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23446 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 979.761629] QAT: Stopping all acceleration devices. 19:04:14 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "00000000000000000000000000000004"}) 19:04:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000340)=ANY=[@ANYBLOB="0106"]) [ 979.802437] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 979.813708] audit: type=1326 audit(1540926254.076:4929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23482 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:04:14 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCCBRK(r0, 0x2000747a) 19:04:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x2d0}, 0x0) [ 979.881933] audit: type=1804 audit(1540926254.146:4930): pid=23487 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1674/file0" dev="sda1" ino=17050 res=1 [ 979.915530] QAT: Stopping all acceleration devices. 19:04:14 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000100)=@in6={0xa, 0x6558, 0xb, @mcast1={0xff, 0x1, [0x0, 0x300, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000000)}, 0x0) 19:04:14 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 979.998601] audit: type=1804 audit(1540926254.196:4931): pid=23498 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1674/file0" dev="sda1" ino=17050 res=1 [ 980.119105] QAT: Stopping all acceleration devices. 19:04:14 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1001, 0x0, 0x0) 19:04:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x7ffffffff000}, 0x0) 19:04:14 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:14 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d0240316285717070") syz_open_dev$sndctrl(&(0x7f00000004c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) [ 980.606663] audit: type=1326 audit(1540926254.866:4932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23482 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:04:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0xd1) close(r1) [ 980.724231] QAT: Stopping all acceleration devices. [ 980.733177] audit: type=1326 audit(1540926254.996:4933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23522 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:04:15 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:15 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 980.781772] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 980.838181] audit: type=1804 audit(1540926255.096:4934): pid=23526 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1675/file0" dev="sda1" ino=17074 res=1 19:04:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x10000000000000}, 0x0) [ 980.892041] QAT: Stopping all acceleration devices. [ 980.910232] QAT: Stopping all acceleration devices. 19:04:15 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) [ 980.931602] audit: type=1804 audit(1540926255.196:4935): pid=23542 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1675/file0" dev="sda1" ino=17074 res=1 [ 981.068096] QAT: Stopping all acceleration devices. 19:04:15 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) 19:04:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x7000000}, 0x0) 19:04:15 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:15 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "000000000000000000000300"}) [ 981.510392] audit: type=1326 audit(1540926255.766:4936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23522 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:04:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 981.605867] QAT: Stopping all acceleration devices. [ 981.618479] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 981.633775] QAT: Stopping all acceleration devices. 19:04:15 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x7f00000000000000}, 0x0) 19:04:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 981.773886] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 981.775289] QAT: Stopping all acceleration devices. 19:04:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e3812bea2052d56d062722903d921eb", 0x10}], 0x1, &(0x7f0000001340)}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000009c0)={'team0\x00', r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x20, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xd1) close(r3) 19:04:16 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 981.879539] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 981.965130] QAT: Stopping all acceleration devices. 19:04:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x200000000000000}, 0x0) 19:04:16 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:16 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 982.549624] QAT: Stopping all acceleration devices. [ 982.561941] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 982.575346] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x100000}, 0x0) 19:04:16 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "0000000000000000000000000000007f"}) [ 982.597203] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 982.730218] QAT: Stopping all acceleration devices. 19:04:17 executing program 3 (fault-call:2 fault-nth:0): r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 982.755032] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x8dffffff}, 0x0) 19:04:17 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 982.897544] FAULT_INJECTION: forcing a failure. [ 982.897544] name failslab, interval 1, probability 0, space 0, times 0 [ 982.930079] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 982.947247] CPU: 0 PID: 23632 Comm: syz-executor3 Not tainted 4.19.0+ #311 [ 982.954306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 982.963667] Call Trace: [ 982.966287] dump_stack+0x244/0x39d [ 982.969942] ? dump_stack_print_info.cold.1+0x20/0x20 [ 982.970682] QAT: Stopping all acceleration devices. [ 982.975155] ? debug_smp_processor_id+0x1c/0x20 [ 982.975178] ? perf_trace_lock+0x14d/0x7a0 [ 982.975209] should_fail.cold.4+0xa/0x17 [ 982.975238] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 982.975262] ? perf_trace_lock+0x14d/0x7a0 [ 982.975289] ? debug_smp_processor_id+0x1c/0x20 [ 982.975320] ? lock_is_held_type+0x210/0x210 [ 982.975343] ? perf_trace_lock+0x7a0/0x7a0 [ 982.975384] ? find_held_lock+0x36/0x1c0 [ 983.015980] ? perf_trace_sched_process_exec+0x860/0x860 [ 983.016002] ? __might_fault+0x12b/0x1e0 [ 983.016035] ? lock_downgrade+0x900/0x900 [ 983.025546] __should_failslab+0x124/0x180 [ 983.025570] should_failslab+0x9/0x14 [ 983.025591] kmem_cache_alloc_node_trace+0x270/0x740 [ 983.025625] __kmalloc_node+0x3c/0x70 [ 983.025648] kvmalloc_node+0x65/0xf0 [ 983.025751] video_usercopy+0xaf6/0x1760 [ 983.058758] ? v4l_s_fmt+0x990/0x990 [ 983.062504] ? v4l_enumstd+0x70/0x70 [ 983.066244] ? find_held_lock+0x36/0x1c0 [ 983.070335] ? __fget+0x4aa/0x740 [ 983.073807] ? lock_downgrade+0x900/0x900 [ 983.077972] ? check_preemption_disabled+0x48/0x280 [ 983.083001] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 983.087932] ? kasan_check_read+0x11/0x20 [ 983.092068] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 983.097348] ? rcu_softirq_qs+0x20/0x20 [ 983.101338] ? __fget+0x4d1/0x740 [ 983.104789] ? ksys_dup3+0x680/0x680 [ 983.108497] ? video_usercopy+0x1760/0x1760 [ 983.112806] video_ioctl2+0x2c/0x33 [ 983.116426] v4l2_ioctl+0x154/0x1b0 [ 983.120046] ? video_devdata+0xa0/0xa0 [ 983.123939] do_vfs_ioctl+0x1de/0x1720 [ 983.127836] ? ioctl_preallocate+0x300/0x300 [ 983.132237] ? __fget_light+0x2e9/0x430 [ 983.136201] ? fget_raw+0x20/0x20 [ 983.139644] ? __sb_end_write+0xd9/0x110 [ 983.143701] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 983.149230] ? fput+0x130/0x1a0 [ 983.152517] ? do_syscall_64+0x9a/0x820 [ 983.156501] ? do_syscall_64+0x9a/0x820 [ 983.160466] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 983.165051] ? security_file_ioctl+0x94/0xc0 [ 983.169454] ksys_ioctl+0xa9/0xd0 [ 983.172905] __x64_sys_ioctl+0x73/0xb0 [ 983.176789] do_syscall_64+0x1b9/0x820 [ 983.180674] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 983.186037] ? syscall_return_slowpath+0x5e0/0x5e0 [ 983.190954] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 983.195807] ? trace_hardirqs_on_caller+0x310/0x310 [ 983.200824] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 983.205836] ? prepare_exit_to_usermode+0x291/0x3b0 [ 983.210888] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 983.215745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 983.220939] RIP: 0033:0x457569 [ 983.224124] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 983.243042] RSP: 002b:00007f5e97d27c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 983.250743] RAX: ffffffffffffffda RBX: 00007f5e97d27c90 RCX: 0000000000457569 [ 983.258024] RDX: 0000000020000180 RSI: 00000000c0285629 RDI: 0000000000000003 [ 983.265289] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 983.272555] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5e97d286d4 [ 983.279824] R13: 00000000004c1d8d R14: 00000000004d2d68 R15: 0000000000000004 19:04:17 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:17 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0xffffff8d}, 0x0) 19:04:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:17 executing program 3 (fault-call:2 fault-nth:1): r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x1000000}, 0x0) [ 983.514712] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 983.521864] QAT: Stopping all acceleration devices. [ 983.549836] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:17 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:17 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c) 19:04:18 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 983.753728] QAT: Stopping all acceleration devices. [ 983.769286] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 983.815110] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 983.844091] QAT: Stopping all acceleration devices. 19:04:18 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x7f000000}, 0x0) 19:04:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c) 19:04:18 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14280000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:18 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0x2, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 984.350875] kauditd_printk_skb: 17 callbacks suppressed [ 984.350891] audit: type=1326 audit(1540926258.606:4954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23658 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 984.459531] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 984.477830] audit: type=1326 audit(1540926258.736:4955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23702 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 984.479223] QAT: Stopping all acceleration devices. 19:04:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c) 19:04:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0xd002}, 0x0) [ 984.545402] audit: type=1804 audit(1540926258.806:4956): pid=23697 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1682/file0" dev="sda1" ino=17133 res=1 19:04:18 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0x5421, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:18 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78afc]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 984.661987] audit: type=1804 audit(1540926258.846:4957): pid=23709 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1682/file0" dev="sda1" ino=17133 res=1 [ 984.698266] QAT: Stopping all acceleration devices. [ 984.832602] audit: type=1804 audit(1540926259.096:4958): pid=23729 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1683/file0" dev="sda1" ino=16527 res=1 [ 984.906865] audit: type=1804 audit(1540926259.166:4959): pid=23733 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1683/file0" dev="sda1" ino=16527 res=1 19:04:19 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x7}, 0x0) 19:04:19 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "000000000000000000000000000000ff"}) 19:04:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1900000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:19 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0189436, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 985.278353] audit: type=1326 audit(1540926259.536:4960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23702 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 985.378380] QAT: Stopping all acceleration devices. 19:04:19 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a'}) 19:04:19 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0x40049409, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 985.429128] audit: type=1326 audit(1540926259.686:4961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23750 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:04:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 985.459186] audit: type=1804 audit(1540926259.686:4962): pid=23747 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1684/file0" dev="sda1" ino=17201 res=1 19:04:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x2000000}, 0x0) 19:04:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 985.555985] QAT: Stopping all acceleration devices. 19:04:19 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285628, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 985.614861] audit: type=1804 audit(1540926259.746:4963): pid=23754 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1684/file0" dev="sda1" ino=17201 res=1 19:04:20 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:20 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, "000000000000000000000000000000fd"}) 19:04:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0xd002000000000000}, 0x0) 19:04:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:20 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0045878, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 986.322838] QAT: Stopping all acceleration devices. 19:04:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x2dddff7f}, 0x0) 19:04:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:20 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0xf0ffffff}, 0x0) 19:04:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8010017d00000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 986.495282] QAT: Stopping all acceleration devices. 19:04:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:21 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0x4020940d, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x10}, 0x0) 19:04:21 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:21 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 987.266400] QAT: Stopping all acceleration devices. 19:04:21 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285667, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:21 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8010017d]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 987.458827] QAT: Stopping all acceleration devices. 19:04:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:22 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:22 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:22 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc058565d, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 988.201920] QAT: Stopping all acceleration devices. 19:04:22 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) [ 988.228571] net_ratelimit: 15 callbacks suppressed [ 988.228585] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:22 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0x5450, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 988.347583] QAT: Stopping all acceleration devices. 19:04:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 988.408786] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:22 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) [ 988.475626] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 988.535814] QAT: Stopping all acceleration devices. 19:04:23 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:23 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0205647, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:23 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 989.167198] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 989.179646] QAT: Stopping all acceleration devices. [ 989.196752] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:23 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0205649, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:23 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d011080]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 989.339913] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 989.375965] QAT: Stopping all acceleration devices. [ 989.455380] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 989.504011] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 989.562179] kauditd_printk_skb: 24 callbacks suppressed [ 989.562195] audit: type=1804 audit(1540926263.826:4988): pid=23963 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1693/file0" dev="sda1" ino=17649 res=1 [ 989.639262] audit: type=1804 audit(1540926263.896:4989): pid=23966 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1693/file0" dev="sda1" ino=17649 res=1 19:04:24 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:24 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:24 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0585609, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 989.925863] audit: type=1326 audit(1540926264.186:4990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23926 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 990.014712] QAT: Stopping all acceleration devices. [ 990.043582] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 990.048900] audit: type=1326 audit(1540926264.306:4991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23979 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 990.082763] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:24 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:24 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0585611, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 990.134069] audit: type=1804 audit(1540926264.386:4992): pid=23972 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1694/file0" dev="sda1" ino=18001 res=1 [ 990.220094] QAT: Stopping all acceleration devices. 19:04:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1802000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 990.241521] audit: type=1804 audit(1540926264.436:4993): pid=23989 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1694/file0" dev="sda1" ino=18001 res=1 19:04:24 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) [ 990.425880] audit: type=1804 audit(1540926264.686:4994): pid=24008 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1695/file0" dev="sda1" ino=17173 res=1 [ 990.456948] QAT: Stopping all acceleration devices. [ 990.504056] audit: type=1804 audit(1540926264.766:4995): pid=24010 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1695/file0" dev="sda1" ino=17173 res=1 19:04:25 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc020660b, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:25 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:25 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) [ 990.832447] audit: type=1326 audit(1540926265.096:4996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23979 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 990.977419] QAT: Stopping all acceleration devices. 19:04:25 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0x5451, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) [ 991.007470] audit: type=1326 audit(1540926265.266:4997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24029 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:04:25 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:25 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc058560f, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 991.232464] QAT: Stopping all acceleration devices. [ 991.265042] QAT: Stopping all acceleration devices. 19:04:26 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:26 executing program 0: write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:26 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x218]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:26 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0045878, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 991.945457] QAT: Stopping all acceleration devices. 19:04:26 executing program 0: write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:26 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:26 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0x5452, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 992.110196] QAT: Stopping all acceleration devices. 19:04:26 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) [ 992.281595] QAT: Stopping all acceleration devices. [ 992.287365] QAT: Stopping all acceleration devices. 19:04:27 executing program 0: write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:27 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:27 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:27 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0x5460, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 992.911717] QAT: Stopping all acceleration devices. 19:04:27 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x4, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:27 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 993.101968] QAT: Stopping all acceleration devices. 19:04:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) [ 993.240999] net_ratelimit: 13 callbacks suppressed [ 993.241013] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 993.272560] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:28 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:28 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x1000000, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:28 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:28 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) [ 993.842120] QAT: Stopping all acceleration devices. [ 993.855613] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 993.868239] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:28 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x2000000, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 993.999991] QAT: Stopping all acceleration devices. 19:04:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:28 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) [ 994.112362] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 994.159668] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 994.181296] QAT: Stopping all acceleration devices. 19:04:29 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:29 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x2, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:29 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 994.724329] kauditd_printk_skb: 22 callbacks suppressed [ 994.724344] audit: type=1326 audit(1540926268.986:5020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24176 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 994.836839] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 994.861475] QAT: Stopping all acceleration devices. 19:04:29 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) [ 994.876637] audit: type=1326 audit(1540926269.136:5021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24213 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 994.898979] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:29 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x100000000000000, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 994.963257] audit: type=1804 audit(1540926269.216:5022): pid=24227 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1704/file0" dev="sda1" ino=17211 res=1 19:04:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x142800]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 995.066731] QAT: Stopping all acceleration devices. [ 995.074485] audit: type=1804 audit(1540926269.266:5023): pid=24232 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1704/file0" dev="sda1" ino=17211 res=1 [ 995.103845] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) [ 995.239405] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 995.274391] audit: type=1804 audit(1540926269.536:5024): pid=24250 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1705/file0" dev="sda1" ino=17211 res=1 [ 995.327275] audit: type=1804 audit(1540926269.586:5025): pid=24255 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1705/file0" dev="sda1" ino=17211 res=1 19:04:29 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:30 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:30 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x200000000000000, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 995.676073] audit: type=1326 audit(1540926269.936:5026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24213 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 995.775347] QAT: Stopping all acceleration devices. 19:04:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:30 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) [ 995.838825] audit: type=1804 audit(1540926270.096:5027): pid=24265 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1706/file0" dev="sda1" ino=18545 res=1 19:04:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:30 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x1000000, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 995.936803] audit: type=1326 audit(1540926270.146:5028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24267 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:04:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 996.047108] QAT: Stopping all acceleration devices. 19:04:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) [ 996.071276] audit: type=1804 audit(1540926270.186:5029): pid=24278 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1706/file0" dev="sda1" ino=18545 res=1 19:04:30 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:30 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:30 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x2000000, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:31 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x2, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 996.833380] QAT: Stopping all acceleration devices. 19:04:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:31 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 997.036557] QAT: Stopping all acceleration devices. 19:04:31 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x200000000000000, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:31 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:31 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) 19:04:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 997.686271] QAT: Stopping all acceleration devices. 19:04:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:32 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x100000000000000, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:32 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d, 0x0}, 0x0) [ 997.827224] QAT: Stopping all acceleration devices. 19:04:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40020000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:32 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:32 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x100000000000000, 0x0, 0x1000000], &(0x7f0000000140)}) [ 998.022187] QAT: Stopping all acceleration devices. 19:04:32 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x1000000, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:32 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:32 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:32 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x1000000, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0xf0ffffff) 19:04:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 998.607114] QAT: Stopping all acceleration devices. [ 998.609466] net_ratelimit: 6 callbacks suppressed [ 998.609480] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x2dddff7f) 19:04:32 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:32 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0x5451, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:33 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x2000000, 0x0, 0x1000000], &(0x7f0000000140)}) [ 998.755263] QAT: Stopping all acceleration devices. 19:04:33 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:33 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x1000000, 0x0, 0x1000000], &(0x7f0000000140)}) [ 998.848071] QAT: Stopping all acceleration devices. 19:04:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x2d0) 19:04:33 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:33 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x2, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:33 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) 19:04:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x700000000000000) 19:04:33 executing program 0 (fault-call:7 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x281400]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 999.524759] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 999.539889] QAT: Stopping all acceleration devices. 19:04:33 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) [ 999.565887] FAULT_INJECTION: forcing a failure. [ 999.565887] name failslab, interval 1, probability 0, space 0, times 0 [ 999.622914] CPU: 1 PID: 24462 Comm: syz-executor0 Not tainted 4.19.0+ #311 [ 999.629976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 999.639347] Call Trace: [ 999.641954] dump_stack+0x244/0x39d [ 999.645598] ? dump_stack_print_info.cold.1+0x20/0x20 [ 999.650812] ? perf_trace_lock+0x4a7/0x7a0 [ 999.655074] should_fail.cold.4+0xa/0x17 [ 999.659147] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 999.664257] ? perf_swevent_put_recursion_context+0xa0/0xa0 [ 999.669993] ? perf_trace_run_bpf_submit+0x26e/0x330 [ 999.675112] ? zap_class+0x640/0x640 [ 999.678829] ? print_usage_bug+0xc0/0xc0 [ 999.682902] ? print_usage_bug+0xc0/0xc0 [ 999.686968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 999.692519] ? find_held_lock+0x36/0x1c0 [ 999.696595] ? __lock_is_held+0xb5/0x140 [ 999.700684] ? perf_trace_sched_process_exec+0x860/0x860 [ 999.706147] ? perf_trace_run_bpf_submit+0x267/0x330 [ 999.711274] __should_failslab+0x124/0x180 [ 999.715522] should_failslab+0x9/0x14 [ 999.719333] kmem_cache_alloc_trace+0x2d7/0x750 [ 999.724012] ? check_preemption_disabled+0x48/0x280 [ 999.729056] ? memset+0x31/0x40 [ 999.732353] tcp_sendmsg_locked+0x29ad/0x3fa0 [ 999.736863] ? debug_smp_processor_id+0x1c/0x20 [ 999.741546] ? lock_is_held_type+0x210/0x210 [ 999.745979] ? tcp_sendpage+0x60/0x60 [ 999.749796] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 999.755357] ? find_held_lock+0x36/0x1c0 [ 999.759436] ? mark_held_locks+0xc7/0x130 [ 999.763595] ? __local_bh_enable_ip+0x160/0x260 [ 999.768289] ? __local_bh_enable_ip+0x160/0x260 [ 999.772972] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 999.777561] ? trace_hardirqs_on+0xbd/0x310 [ 999.781890] ? lock_release+0xa00/0xa00 [ 999.785868] ? lock_sock_nested+0xe2/0x120 [ 999.790112] ? trace_hardirqs_off_caller+0x310/0x310 [ 999.795224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 999.800769] ? check_preemption_disabled+0x48/0x280 [ 999.805804] ? lock_sock_nested+0x9a/0x120 [ 999.810053] ? lock_sock_nested+0x9a/0x120 [ 999.814300] ? __local_bh_enable_ip+0x160/0x260 [ 999.818986] tcp_sendmsg+0x2f/0x50 [ 999.822548] inet_sendmsg+0x1a1/0x690 [ 999.826357] ? ipip_gro_receive+0x100/0x100 [ 999.830691] ? apparmor_socket_sendmsg+0x29/0x30 [ 999.835452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 999.840997] ? security_socket_sendmsg+0x94/0xc0 [ 999.845769] ? ipip_gro_receive+0x100/0x100 [ 999.850104] sock_sendmsg+0xd5/0x120 [ 999.853831] __sys_sendto+0x3d7/0x670 [ 999.857643] ? __ia32_sys_getpeername+0xb0/0xb0 [ 999.862323] ? wait_for_completion+0x8a0/0x8a0 [ 999.866933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 999.872487] ? __sb_end_write+0xd9/0x110 [ 999.876559] ? fput+0x130/0x1a0 [ 999.879850] ? do_syscall_64+0x9a/0x820 [ 999.883836] ? do_syscall_64+0x9a/0x820 [ 999.887821] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 999.892410] ? trace_hardirqs_on+0xbd/0x310 [ 999.896738] ? __ia32_sys_read+0xb0/0xb0 [ 999.900816] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 999.906194] ? trace_hardirqs_off_caller+0x310/0x310 [ 999.911311] __x64_sys_sendto+0xe1/0x1a0 [ 999.915385] do_syscall_64+0x1b9/0x820 [ 999.919279] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 999.924650] ? syscall_return_slowpath+0x5e0/0x5e0 [ 999.929764] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 999.934623] ? trace_hardirqs_on_caller+0x310/0x310 [ 999.939646] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 999.944675] ? prepare_exit_to_usermode+0x291/0x3b0 [ 999.949704] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 999.954567] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 999.959760] RIP: 0033:0x457569 [ 999.962967] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 999.981874] RSP: 002b:00007f4f2bdf6c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 999.989586] RAX: ffffffffffffffda RBX: 00007f4f2bdf6c90 RCX: 0000000000457569 [ 999.996861] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000005 [ 1000.004133] RBP: 000000000072bf00 R08: 0000000020000080 R09: 000000000000001c [ 1000.011404] R10: 0000000020000003 R11: 0000000000000246 R12: 00007f4f2bdf76d4 19:04:34 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x200000000000000, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x1000000) [ 1000.018677] R13: 00000000004c3b78 R14: 00000000004d5ca8 R15: 0000000000000007 [ 1000.041856] kauditd_printk_skb: 21 callbacks suppressed [ 1000.041872] audit: type=1804 audit(1540926274.286:5051): pid=24474 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1713/file0" dev="sda1" ino=16929 res=1 19:04:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1000.098773] QAT: Stopping all acceleration devices. 19:04:34 executing program 0 (fault-call:7 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:34 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) [ 1000.162504] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1000.208616] audit: type=1804 audit(1540926274.466:5052): pid=24486 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1714/file0" dev="sda1" ino=16625 res=1 [ 1000.230036] FAULT_INJECTION: forcing a failure. [ 1000.230036] name failslab, interval 1, probability 0, space 0, times 0 [ 1000.244376] CPU: 0 PID: 24492 Comm: syz-executor0 Not tainted 4.19.0+ #311 [ 1000.251416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.260790] Call Trace: [ 1000.263407] dump_stack+0x244/0x39d [ 1000.267088] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1000.267682] QAT: Stopping all acceleration devices. [ 1000.272337] should_fail.cold.4+0xa/0x17 [ 1000.272359] ? perf_trace_lock+0x4a7/0x7a0 [ 1000.272388] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1000.272424] ? lock_is_held_type+0x210/0x210 [ 1000.295256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1000.300826] ? check_preemption_disabled+0x48/0x280 [ 1000.305870] ? perf_trace_lock_acquire+0x15b/0x800 [ 1000.310839] ? debug_smp_processor_id+0x1c/0x20 [ 1000.315540] ? perf_trace_lock_acquire+0x15b/0x800 [ 1000.320502] ? print_usage_bug+0xc0/0xc0 [ 1000.324595] ? print_usage_bug+0xc0/0xc0 [ 1000.324630] ? find_held_lock+0x36/0x1c0 [ 1000.324676] ? mark_held_locks+0xc7/0x130 [ 1000.336956] ? inet_get_local_port_range+0x36a/0x520 [ 1000.342093] ? inet_get_local_port_range+0x36a/0x520 [ 1000.347227] __should_failslab+0x124/0x180 [ 1000.351482] should_failslab+0x9/0x14 [ 1000.355305] kmem_cache_alloc+0x47/0x730 [ 1000.359389] ? kasan_check_read+0x11/0x20 [ 1000.363580] inet_bind_bucket_create+0x82/0x320 [ 1000.368293] ? __inet_lookup_listener+0xb20/0xb20 [ 1000.373191] __inet_hash_connect+0x969/0xfb0 [ 1000.377700] ? inet6_lookup+0xe0/0xe0 [ 1000.381560] ? inet_hash+0xb0/0xb0 [ 1000.385138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1000.390706] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1000.396260] ? __siphash_aligned+0x1c3/0x330 [ 1000.400715] ? secure_ipv6_port_ephemeral+0x1df/0x2f0 [ 1000.401231] audit: type=1326 audit(1540926274.666:5053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24460 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1000.405919] ? secure_tcpv6_seq+0x350/0x350 [ 1000.431234] ? assoc_array_gc+0x1540/0x1550 [ 1000.435568] ? tcp_alloc_md5sig_pool+0x480/0x480 [ 1000.440327] ? rcu_note_context_switch+0x138e/0x2150 [ 1000.445443] ? rcu_softirq_qs+0x20/0x20 [ 1000.449457] inet6_hash_connect+0x76/0xe0 [ 1000.453683] tcp_v6_connect+0x182a/0x29b0 [ 1000.457892] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 1000.462517] ? unwind_get_return_address+0x61/0xa0 [ 1000.467483] ? __save_stack_trace+0x8d/0xf0 [ 1000.471869] ? save_stack+0xa9/0xd0 [ 1000.475528] ? save_stack+0x43/0xd0 [ 1000.479177] ? kasan_kmalloc+0xc7/0xe0 [ 1000.483079] ? kmem_cache_alloc_trace+0x152/0x750 [ 1000.483099] ? tcp_sendmsg_locked+0x29ad/0x3fa0 [ 1000.483117] ? tcp_sendmsg+0x2f/0x50 [ 1000.483137] ? inet_sendmsg+0x1a1/0x690 [ 1000.483154] ? sock_sendmsg+0xd5/0x120 [ 1000.483177] ? __sys_sendto+0x3d7/0x670 [ 1000.508240] ? __x64_sys_sendto+0xe1/0x1a0 [ 1000.512506] ? do_syscall_64+0x1b9/0x820 [ 1000.516597] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1000.521988] ? print_usage_bug+0xc0/0xc0 [ 1000.526111] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1000.531711] ? zap_class+0x640/0x640 [ 1000.535472] __inet_stream_connect+0x992/0x1150 [ 1000.540169] ? __inet_stream_connect+0x992/0x1150 [ 1000.545073] ? inet_dgram_connect+0x2e0/0x2e0 [ 1000.549595] ? __lock_is_held+0xb5/0x140 19:04:34 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x7) 19:04:34 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) [ 1000.552693] audit: type=1326 audit(1540926274.816:5054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24500 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1000.553704] ? tcp_sendmsg_locked+0x29ad/0x3fa0 [ 1000.553729] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1000.553755] ? kmem_cache_alloc_trace+0x353/0x750 [ 1000.553778] ? check_preemption_disabled+0x48/0x280 [ 1000.553804] ? memset+0x31/0x40 [ 1000.595054] QAT: Stopping all acceleration devices. [ 1000.597664] tcp_sendmsg_locked+0x2b37/0x3fa0 19:04:34 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) [ 1000.597700] ? debug_smp_processor_id+0x1c/0x20 [ 1000.597733] ? lock_is_held_type+0x210/0x210 [ 1000.597781] ? tcp_sendpage+0x60/0x60 [ 1000.620176] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1000.625779] ? find_held_lock+0x36/0x1c0 [ 1000.629884] ? mark_held_locks+0xc7/0x130 [ 1000.634073] ? __local_bh_enable_ip+0x160/0x260 [ 1000.638772] ? __local_bh_enable_ip+0x160/0x260 [ 1000.643468] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1000.648076] ? trace_hardirqs_on+0xbd/0x310 [ 1000.652422] ? lock_release+0xa00/0xa00 [ 1000.656426] ? lock_sock_nested+0xe2/0x120 [ 1000.660687] ? trace_hardirqs_off_caller+0x310/0x310 [ 1000.665818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1000.671388] ? check_preemption_disabled+0x48/0x280 [ 1000.676438] ? lock_sock_nested+0x9a/0x120 [ 1000.680703] ? lock_sock_nested+0x9a/0x120 [ 1000.684969] ? __local_bh_enable_ip+0x160/0x260 [ 1000.689688] tcp_sendmsg+0x2f/0x50 [ 1000.693264] inet_sendmsg+0x1a1/0x690 [ 1000.697115] ? ipip_gro_receive+0x100/0x100 [ 1000.699829] QAT: Stopping all acceleration devices. 19:04:35 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) [ 1000.701468] ? apparmor_socket_sendmsg+0x29/0x30 [ 1000.701493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1000.701516] ? security_socket_sendmsg+0x94/0xc0 [ 1000.701539] ? ipip_gro_receive+0x100/0x100 [ 1000.701567] sock_sendmsg+0xd5/0x120 [ 1000.701593] __sys_sendto+0x3d7/0x670 [ 1000.701625] ? __ia32_sys_getpeername+0xb0/0xb0 [ 1000.701653] ? wait_for_completion+0x8a0/0x8a0 [ 1000.742839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1000.748429] ? __sb_end_write+0xd9/0x110 [ 1000.752532] ? fput+0x130/0x1a0 [ 1000.755841] ? do_syscall_64+0x9a/0x820 19:04:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x100000000000000) [ 1000.759838] ? do_syscall_64+0x9a/0x820 [ 1000.763845] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1000.768459] ? trace_hardirqs_on+0xbd/0x310 [ 1000.772803] ? __ia32_sys_read+0xb0/0xb0 [ 1000.776892] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1000.782295] ? trace_hardirqs_off_caller+0x310/0x310 [ 1000.787444] __x64_sys_sendto+0xe1/0x1a0 [ 1000.791547] do_syscall_64+0x1b9/0x820 [ 1000.795469] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1000.800864] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1000.801658] QAT: Stopping all acceleration devices. 19:04:35 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) [ 1000.805816] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1000.805844] ? trace_hardirqs_on_caller+0x310/0x310 [ 1000.805868] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1000.805895] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1000.805931] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1000.835708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1000.840917] RIP: 0033:0x457569 [ 1000.844137] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1000.863063] RSP: 002b:00007f4f2bdf6c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1000.870796] RAX: ffffffffffffffda RBX: 00007f4f2bdf6c90 RCX: 0000000000457569 [ 1000.878085] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000005 [ 1000.885379] RBP: 000000000072bf00 R08: 0000000020000080 R09: 000000000000001c [ 1000.892673] R10: 0000000020000003 R11: 0000000000000246 R12: 00007f4f2bdf76d4 [ 1000.899965] R13: 00000000004c3b78 R14: 00000000004d5ca8 R15: 0000000000000007 19:04:35 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x2, 0x1000000], &(0x7f0000000140)}) 19:04:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0xffffff8d) 19:04:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1000.931266] QAT: Stopping all acceleration devices. [ 1000.938866] audit: type=1804 audit(1540926275.196:5055): pid=24518 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1714/file0" dev="sda1" ino=16625 res=1 19:04:35 executing program 0 (fault-call:7 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:35 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, '\x00'}) [ 1001.076115] QAT: Stopping all acceleration devices. [ 1001.080071] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1001.132214] FAULT_INJECTION: forcing a failure. [ 1001.132214] name failslab, interval 1, probability 0, space 0, times 0 [ 1001.145563] audit: type=1804 audit(1540926275.406:5056): pid=24525 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1715/file0" dev="sda1" ino=17073 res=1 [ 1001.170328] CPU: 1 PID: 24532 Comm: syz-executor0 Not tainted 4.19.0+ #311 [ 1001.177372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1001.186732] Call Trace: [ 1001.189337] dump_stack+0x244/0x39d [ 1001.192982] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1001.198195] ? perf_trace_lock+0x4a7/0x7a0 [ 1001.202447] should_fail.cold.4+0xa/0x17 [ 1001.206522] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1001.211639] ? __lock_acquire+0x62f/0x4c20 [ 1001.215898] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1001.221010] ? zap_class+0x640/0x640 [ 1001.224745] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1001.229860] ? perf_trace_run_bpf_submit+0x26e/0x330 [ 1001.234978] ? find_held_lock+0x36/0x1c0 [ 1001.239061] ? __lock_is_held+0xb5/0x140 [ 1001.243148] ? perf_trace_sched_process_exec+0x860/0x860 [ 1001.248610] ? lock_is_held_type+0x210/0x210 [ 1001.253043] __should_failslab+0x124/0x180 [ 1001.257294] should_failslab+0x9/0x14 [ 1001.261108] kmem_cache_alloc_node+0x26e/0x730 [ 1001.265701] ? zap_class+0x640/0x640 [ 1001.269429] __alloc_skb+0x119/0x770 [ 1001.273159] ? netdev_alloc_frag+0x1f0/0x1f0 [ 1001.277585] ? ip6_mtu+0x39c/0x520 [ 1001.281137] ? lock_downgrade+0x900/0x900 [ 1001.285291] ? check_preemption_disabled+0x48/0x280 [ 1001.290321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1001.295864] ? tcp_chrono_stop+0x25f/0x520 [ 1001.300107] ? tcp_chrono_start+0x1e0/0x1e0 [ 1001.304437] ? zap_class+0x640/0x640 [ 1001.308166] sk_stream_alloc_skb+0x141/0x970 [ 1001.312593] ? tcp_init_transfer+0x470/0x470 [ 1001.317011] ? __lock_is_held+0xb5/0x140 [ 1001.321120] tcp_connect+0x12e5/0x46e0 [ 1001.325042] ? tcp_push_one+0x110/0x110 [ 1001.329034] ? ktime_get_with_offset+0x38b/0x470 [ 1001.333875] ? pvclock_read_flags+0x160/0x160 [ 1001.338384] ? secure_tcpv6_seq+0x233/0x350 [ 1001.342713] ? trace_hardirqs_off_caller+0x310/0x310 [ 1001.347831] ? kvm_clock_read+0x18/0x30 [ 1001.351814] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1001.356834] ? ktime_get_with_offset+0x310/0x470 [ 1001.361608] ? ktime_get+0x400/0x400 [ 1001.365336] ? __siphash_aligned+0x1c3/0x330 [ 1001.369753] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1001.375305] ? siphash_4u64+0x25/0x3c0 [ 1001.379208] ? secure_tcpv6_ts_off+0x2b8/0x430 [ 1001.383800] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1001.389345] ? tcp_fastopen_defer_connect+0x173/0x4a0 [ 1001.394551] ? tcp_fastopen_cookie_check+0x470/0x470 [ 1001.399663] ? rcu_note_context_switch+0x138e/0x2150 [ 1001.404836] ? prandom_u32_state+0x13/0x180 [ 1001.409194] tcp_v6_connect+0x1c0f/0x29b0 [ 1001.413364] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 1001.417954] ? unwind_get_return_address+0x61/0xa0 [ 1001.422897] ? __save_stack_trace+0x8d/0xf0 [ 1001.427246] ? save_stack+0xa9/0xd0 [ 1001.430884] ? save_stack+0x43/0xd0 [ 1001.434513] ? kasan_kmalloc+0xc7/0xe0 [ 1001.438404] ? kmem_cache_alloc_trace+0x152/0x750 [ 1001.443255] ? tcp_sendmsg_locked+0x29ad/0x3fa0 [ 1001.447925] ? tcp_sendmsg+0x2f/0x50 [ 1001.451642] ? inet_sendmsg+0x1a1/0x690 [ 1001.455617] ? sock_sendmsg+0xd5/0x120 [ 1001.459508] ? __sys_sendto+0x3d7/0x670 [ 1001.463485] ? __x64_sys_sendto+0xe1/0x1a0 [ 1001.467725] ? do_syscall_64+0x1b9/0x820 [ 1001.471796] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1001.477165] ? print_usage_bug+0xc0/0xc0 [ 1001.481236] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1001.486799] ? zap_class+0x640/0x640 [ 1001.490537] __inet_stream_connect+0x992/0x1150 [ 1001.495214] ? __inet_stream_connect+0x992/0x1150 [ 1001.500080] ? inet_dgram_connect+0x2e0/0x2e0 [ 1001.504583] ? __lock_is_held+0xb5/0x140 [ 1001.508664] ? tcp_sendmsg_locked+0x29ad/0x3fa0 [ 1001.513371] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1001.518395] ? kmem_cache_alloc_trace+0x353/0x750 [ 1001.523251] ? check_preemption_disabled+0x48/0x280 [ 1001.528276] ? memset+0x31/0x40 [ 1001.531570] tcp_sendmsg_locked+0x2b37/0x3fa0 [ 1001.536077] ? debug_smp_processor_id+0x1c/0x20 [ 1001.540761] ? lock_is_held_type+0x210/0x210 [ 1001.545206] ? tcp_sendpage+0x60/0x60 [ 1001.549029] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1001.554589] ? find_held_lock+0x36/0x1c0 [ 1001.558667] ? mark_held_locks+0xc7/0x130 [ 1001.562822] ? __local_bh_enable_ip+0x160/0x260 [ 1001.567497] ? __local_bh_enable_ip+0x160/0x260 [ 1001.572174] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1001.576769] ? trace_hardirqs_on+0xbd/0x310 [ 1001.581102] ? lock_release+0xa00/0xa00 [ 1001.585085] ? lock_sock_nested+0xe2/0x120 [ 1001.589326] ? trace_hardirqs_off_caller+0x310/0x310 [ 1001.594435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1001.599982] ? check_preemption_disabled+0x48/0x280 [ 1001.605005] ? lock_sock_nested+0x9a/0x120 [ 1001.609255] ? lock_sock_nested+0x9a/0x120 [ 1001.613499] ? __local_bh_enable_ip+0x160/0x260 [ 1001.618187] tcp_sendmsg+0x2f/0x50 [ 1001.621739] inet_sendmsg+0x1a1/0x690 [ 1001.625554] ? ipip_gro_receive+0x100/0x100 [ 1001.629883] ? apparmor_socket_sendmsg+0x29/0x30 [ 1001.634645] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1001.640193] ? security_socket_sendmsg+0x94/0xc0 [ 1001.644955] ? ipip_gro_receive+0x100/0x100 [ 1001.649287] sock_sendmsg+0xd5/0x120 [ 1001.653011] __sys_sendto+0x3d7/0x670 [ 1001.656835] ? __ia32_sys_getpeername+0xb0/0xb0 [ 1001.661520] ? wait_for_completion+0x8a0/0x8a0 [ 1001.666131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1001.671682] ? __sb_end_write+0xd9/0x110 [ 1001.675758] ? fput+0x130/0x1a0 [ 1001.679053] ? do_syscall_64+0x9a/0x820 [ 1001.683044] ? do_syscall_64+0x9a/0x820 [ 1001.687038] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1001.691635] ? trace_hardirqs_on+0xbd/0x310 [ 1001.695960] ? __ia32_sys_read+0xb0/0xb0 [ 1001.700036] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1001.705413] ? trace_hardirqs_off_caller+0x310/0x310 [ 1001.710529] __x64_sys_sendto+0xe1/0x1a0 [ 1001.714602] do_syscall_64+0x1b9/0x820 [ 1001.718500] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1001.723872] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1001.728812] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1001.733663] ? trace_hardirqs_on_caller+0x310/0x310 [ 1001.738689] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1001.743712] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1001.748741] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1001.753599] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1001.758794] RIP: 0033:0x457569 [ 1001.761992] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1001.780901] RSP: 002b:00007f4f2bdf6c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1001.788626] RAX: ffffffffffffffda RBX: 00007f4f2bdf6c90 RCX: 0000000000457569 [ 1001.795901] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000005 [ 1001.803172] RBP: 000000000072bf00 R08: 0000000020000080 R09: 000000000000001c [ 1001.810445] R10: 0000000020000003 R11: 0000000000000246 R12: 00007f4f2bdf76d4 [ 1001.817719] R13: 00000000004c3b78 R14: 00000000004d5ca8 R15: 0000000000000007 [ 1001.828829] audit: type=1804 audit(1540926276.086:5057): pid=24539 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1715/file0" dev="sda1" ino=17073 res=1 [ 1001.900832] audit: type=1326 audit(1540926276.116:5058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24500 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:04:36 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:36 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) fcntl$setlease(r0, 0x400, 0x2) 19:04:36 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x100000000000000, 0x1000000], &(0x7f0000000140)}) 19:04:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0xd002) 19:04:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:36 executing program 0 (fault-call:7 fault-nth:3): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1001.987565] QAT: Stopping all acceleration devices. 19:04:36 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x200000000000000, 0x1000000], &(0x7f0000000140)}) [ 1002.011671] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1002.032098] QAT: Stopping all acceleration devices. 19:04:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0xd0020000) [ 1002.075006] audit: type=1804 audit(1540926276.336:5059): pid=24551 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1716/file0" dev="sda1" ino=16929 res=1 [ 1002.093935] FAULT_INJECTION: forcing a failure. [ 1002.093935] name failslab, interval 1, probability 0, space 0, times 0 [ 1002.113730] CPU: 1 PID: 24560 Comm: syz-executor0 Not tainted 4.19.0+ #311 [ 1002.120789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1002.130152] Call Trace: [ 1002.132761] dump_stack+0x244/0x39d [ 1002.136422] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1002.141632] ? debug_smp_processor_id+0x1c/0x20 [ 1002.144265] audit: type=1326 audit(1540926276.346:5060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24557 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1002.146320] ? perf_trace_lock+0x14d/0x7a0 [ 1002.146347] should_fail.cold.4+0xa/0x17 19:04:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x7ffffffff000) [ 1002.146375] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1002.180762] ? zap_class+0x640/0x640 [ 1002.184505] ? save_stack+0xa9/0xd0 [ 1002.188159] ? find_held_lock+0x36/0x1c0 [ 1002.192250] ? __lock_is_held+0xb5/0x140 [ 1002.196351] ? perf_trace_sched_process_exec+0x860/0x860 [ 1002.201824] ? check_preemption_disabled+0x48/0x280 [ 1002.206865] __should_failslab+0x124/0x180 [ 1002.211127] should_failslab+0x9/0x14 [ 1002.214947] kmem_cache_alloc_node_trace+0x270/0x740 [ 1002.220089] __kmalloc_node_track_caller+0x3c/0x70 19:04:36 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x1000000, 0x1000000], &(0x7f0000000140)}) [ 1002.225051] __kmalloc_reserve.isra.40+0x41/0xe0 [ 1002.229832] __alloc_skb+0x155/0x770 [ 1002.233570] ? netdev_alloc_frag+0x1f0/0x1f0 [ 1002.238002] ? ip6_mtu+0x39c/0x520 [ 1002.241569] ? lock_downgrade+0x900/0x900 [ 1002.245732] ? check_preemption_disabled+0x48/0x280 [ 1002.250769] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1002.250794] ? tcp_chrono_stop+0x25f/0x520 [ 1002.250814] ? tcp_chrono_start+0x1e0/0x1e0 [ 1002.250833] ? zap_class+0x640/0x640 [ 1002.260607] sk_stream_alloc_skb+0x141/0x970 [ 1002.273038] ? tcp_init_transfer+0x470/0x470 [ 1002.277474] ? __lock_is_held+0xb5/0x140 [ 1002.281569] tcp_connect+0x12e5/0x46e0 [ 1002.285488] ? tcp_push_one+0x110/0x110 [ 1002.289486] ? ktime_get_with_offset+0x38b/0x470 [ 1002.294271] ? pvclock_read_flags+0x160/0x160 [ 1002.298798] ? secure_tcpv6_seq+0x233/0x350 [ 1002.303139] ? trace_hardirqs_off_caller+0x310/0x310 [ 1002.308273] ? kvm_clock_read+0x18/0x30 [ 1002.312263] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1002.317302] ? ktime_get_with_offset+0x310/0x470 [ 1002.322083] ? ktime_get+0x400/0x400 19:04:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fdc]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1002.325827] ? __siphash_aligned+0x1c3/0x330 [ 1002.330245] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1002.335804] ? siphash_4u64+0x25/0x3c0 [ 1002.339721] ? secure_tcpv6_ts_off+0x2b8/0x430 [ 1002.344320] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1002.349873] ? tcp_fastopen_defer_connect+0x173/0x4a0 [ 1002.349897] ? tcp_fastopen_cookie_check+0x470/0x470 [ 1002.349916] ? rcu_note_context_switch+0x138e/0x2150 [ 1002.365316] ? prandom_u32_state+0x13/0x180 [ 1002.369673] tcp_v6_connect+0x1c0f/0x29b0 [ 1002.373856] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 1002.378454] ? unwind_get_return_address+0x61/0xa0 [ 1002.383406] ? __save_stack_trace+0x8d/0xf0 [ 1002.386815] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1002.387761] ? save_stack+0xa9/0xd0 [ 1002.387790] ? save_stack+0x43/0xd0 [ 1002.387815] ? kasan_kmalloc+0xc7/0xe0 [ 1002.387832] ? kmem_cache_alloc_trace+0x152/0x750 [ 1002.387855] ? tcp_sendmsg_locked+0x29ad/0x3fa0 [ 1002.418763] ? tcp_sendmsg+0x2f/0x50 [ 1002.422489] ? inet_sendmsg+0x1a1/0x690 [ 1002.426467] ? sock_sendmsg+0xd5/0x120 [ 1002.430358] ? __sys_sendto+0x3d7/0x670 [ 1002.434337] ? __x64_sys_sendto+0xe1/0x1a0 [ 1002.438576] ? do_syscall_64+0x1b9/0x820 [ 1002.442648] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1002.448026] ? print_usage_bug+0xc0/0xc0 [ 1002.452115] ? zap_class+0x640/0x640 [ 1002.455845] __inet_stream_connect+0x992/0x1150 [ 1002.460517] ? __inet_stream_connect+0x992/0x1150 [ 1002.465375] ? inet_dgram_connect+0x2e0/0x2e0 [ 1002.469873] ? __lock_is_held+0xb5/0x140 [ 1002.473954] ? tcp_sendmsg_locked+0x29ad/0x3fa0 [ 1002.478633] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1002.483662] ? kmem_cache_alloc_trace+0x353/0x750 [ 1002.488518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1002.494071] tcp_sendmsg_locked+0x2b37/0x3fa0 [ 1002.498578] ? debug_smp_processor_id+0x1c/0x20 [ 1002.503258] ? lock_is_held_type+0x210/0x210 [ 1002.507687] ? tcp_sendpage+0x60/0x60 [ 1002.511502] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1002.517067] ? find_held_lock+0x36/0x1c0 [ 1002.521147] ? mark_held_locks+0xc7/0x130 [ 1002.525300] ? __local_bh_enable_ip+0x160/0x260 [ 1002.529972] ? __local_bh_enable_ip+0x160/0x260 [ 1002.534651] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1002.539239] ? trace_hardirqs_on+0xbd/0x310 [ 1002.543566] ? lock_release+0xa00/0xa00 [ 1002.547542] ? lock_sock_nested+0xe2/0x120 [ 1002.551790] ? trace_hardirqs_off_caller+0x310/0x310 [ 1002.556899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1002.562442] ? check_preemption_disabled+0x48/0x280 [ 1002.567462] ? lock_sock_nested+0x9a/0x120 [ 1002.571703] ? lock_sock_nested+0x9a/0x120 [ 1002.575942] ? __local_bh_enable_ip+0x160/0x260 [ 1002.580629] tcp_sendmsg+0x2f/0x50 [ 1002.584181] inet_sendmsg+0x1a1/0x690 [ 1002.587990] ? ipip_gro_receive+0x100/0x100 [ 1002.592326] ? apparmor_socket_sendmsg+0x29/0x30 [ 1002.597093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1002.602635] ? security_socket_sendmsg+0x94/0xc0 [ 1002.607399] ? ipip_gro_receive+0x100/0x100 [ 1002.611732] sock_sendmsg+0xd5/0x120 [ 1002.615456] __sys_sendto+0x3d7/0x670 [ 1002.619267] ? __ia32_sys_getpeername+0xb0/0xb0 [ 1002.623953] ? wait_for_completion+0x8a0/0x8a0 [ 1002.628560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1002.634115] ? __sb_end_write+0xd9/0x110 [ 1002.638193] ? fput+0x130/0x1a0 [ 1002.641478] ? do_syscall_64+0x9a/0x820 [ 1002.645461] ? do_syscall_64+0x9a/0x820 [ 1002.649447] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1002.654046] ? trace_hardirqs_on+0xbd/0x310 [ 1002.658373] ? __ia32_sys_read+0xb0/0xb0 [ 1002.662443] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1002.667820] ? trace_hardirqs_off_caller+0x310/0x310 [ 1002.672936] __x64_sys_sendto+0xe1/0x1a0 [ 1002.677010] do_syscall_64+0x1b9/0x820 [ 1002.680914] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1002.686290] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1002.691230] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1002.696087] ? trace_hardirqs_on_caller+0x310/0x310 [ 1002.701114] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1002.706138] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1002.711173] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1002.716046] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1002.721242] RIP: 0033:0x457569 [ 1002.724440] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1002.743343] RSP: 002b:00007f4f2bdf6c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1002.751053] RAX: ffffffffffffffda RBX: 00007f4f2bdf6c90 RCX: 0000000000457569 [ 1002.758344] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000005 [ 1002.765614] RBP: 000000000072bf00 R08: 0000000020000080 R09: 000000000000001c 19:04:37 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) recvmsg(r0, &(0x7f00000002c0)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)=""/165, 0xa5}, {&(0x7f00000005c0)=""/95, 0x5f}, {&(0x7f0000000380)=""/221, 0xdd}, {&(0x7f0000000240)=""/72, 0x48}, {&(0x7f0000000000)=""/12, 0xc}], 0x5, &(0x7f0000000500)=""/137, 0x89, 0x8}, 0x10001) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 1002.772886] R10: 0000000020000003 R11: 0000000000000246 R12: 00007f4f2bdf76d4 [ 1002.780157] R13: 00000000004c3b78 R14: 00000000004d5ca8 R15: 0000000000000007 [ 1002.850348] QAT: Stopping all acceleration devices. [ 1002.866818] QAT: Stopping all acceleration devices. 19:04:37 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:37 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x2000000, 0x1000000], &(0x7f0000000140)}) 19:04:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x8dffffff) 19:04:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:37 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @rand_addr=0x5}, "0600"}) write$P9_RSYMLINK(r0, &(0x7f0000000000)={0x14, 0x11, 0x1, {0x1, 0x2, 0x1}}, 0x14) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 19:04:37 executing program 0 (fault-call:7 fault-nth:4): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1003.044748] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1003.045755] QAT: Stopping all acceleration devices. 19:04:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0xd002000000000000) [ 1003.087557] QAT: Invalid ioctl [ 1003.097701] FAULT_INJECTION: forcing a failure. [ 1003.097701] name failslab, interval 1, probability 0, space 0, times 0 [ 1003.111773] QAT: Stopping all acceleration devices. [ 1003.122723] CPU: 1 PID: 24614 Comm: syz-executor0 Not tainted 4.19.0+ #311 19:04:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x7000000) 19:04:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x100000) [ 1003.129756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1003.139122] Call Trace: [ 1003.141735] dump_stack+0x244/0x39d [ 1003.145407] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1003.150629] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1003.156186] ? check_preemption_disabled+0x48/0x280 [ 1003.161229] should_fail.cold.4+0xa/0x17 [ 1003.165313] ? perf_trace_lock+0x14d/0x7a0 [ 1003.169575] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1003.174696] ? lock_is_held_type+0x210/0x210 [ 1003.179124] ? print_usage_bug+0xc0/0xc0 [ 1003.183212] ? zap_class+0x640/0x640 [ 1003.186945] ? print_usage_bug+0xc0/0xc0 [ 1003.191032] ? print_usage_bug+0xc0/0xc0 [ 1003.195130] ? find_held_lock+0x36/0x1c0 [ 1003.199282] ? __nf_conntrack_find_get.part.44+0x10de/0x1cf0 [ 1003.205106] ? lock_downgrade+0x900/0x900 [ 1003.209272] ? check_preemption_disabled+0x48/0x280 [ 1003.214310] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1003.219258] ? kasan_check_read+0x11/0x20 [ 1003.223417] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1003.228719] __should_failslab+0x124/0x180 [ 1003.232983] should_failslab+0x9/0x14 19:04:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x2) 19:04:37 executing program 4: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x10000, 0x20401) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0x400000) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040)=0x40, 0x4) [ 1003.236810] kmem_cache_alloc+0x47/0x730 [ 1003.240895] ? __nf_conntrack_find_get.part.44+0x1105/0x1cf0 [ 1003.246719] __nf_conntrack_alloc+0x1aa/0x7c0 [ 1003.251236] ? early_drop+0xc20/0xc20 [ 1003.255071] ? perf_trace_lock+0x7a0/0x7a0 [ 1003.259316] ? __lock_acquire+0x62f/0x4c20 [ 1003.259379] ? perf_trace_lock_acquire+0x15b/0x800 [ 1003.268539] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1003.268562] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1003.268588] init_conntrack.isra.47+0xff6/0x13c0 [ 1003.268607] ? ipv6_find_tlv+0x260/0x260 [ 1003.288127] ? memcpy+0x45/0x50 [ 1003.291434] ? nf_conntrack_alloc+0x50/0x50 [ 1003.295793] ? lock_acquire+0x1ed/0x520 [ 1003.299794] ? nf_conntrack_in+0x5de/0x13b0 [ 1003.305006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1003.305039] ? check_preemption_disabled+0x48/0x280 [ 1003.305066] ? kasan_check_read+0x11/0x20 [ 1003.305084] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1003.305112] ? ip6t_do_table+0xd6a/0x1d30 [ 1003.305141] nf_conntrack_in+0xc7d/0x13b0 [ 1003.305179] ? nf_conntrack_update+0xbc0/0xbc0 19:04:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0xf0ffffff7f0000) [ 1003.338027] ? ip6t_error+0x40/0x40 [ 1003.338049] ? check_preemption_disabled+0x48/0x280 [ 1003.338083] ? zap_class+0x640/0x640 [ 1003.338104] ? lock_acquire+0x190/0x520 [ 1003.338124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1003.338161] ? ipv4_conntrack_local+0x220/0x220 [ 1003.338177] ipv6_conntrack_local+0x1d/0x30 [ 1003.338195] nf_hook_slow+0xc2/0x1c0 [ 1003.338223] ip6_xmit+0x1390/0x2420 [ 1003.338259] ? ip6_finish_output2+0x27a0/0x27a0 [ 1003.338278] ? inet6_csk_route_socket+0x704/0x1020 [ 1003.338294] ? zap_class+0x571/0x640 [ 1003.338329] ? ip6_append_data+0x2d0/0x2d0 [ 1003.338344] ? lock_acquire+0x1ed/0x520 [ 1003.338362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1003.338380] ? check_preemption_disabled+0x48/0x280 [ 1003.338411] ? __lock_is_held+0xb5/0x140 [ 1003.338446] inet6_csk_xmit+0x375/0x630 [ 1003.338465] ? inet6_csk_update_pmtu+0x190/0x190 [ 1003.338489] ? refcount_dec_if_one+0x180/0x180 [ 1003.425978] ? ip6_mtu+0x160/0x520 [ 1003.429553] __tcp_transmit_skb+0x1c0e/0x3b60 [ 1003.434068] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1003.439012] ? kasan_check_read+0x11/0x20 [ 1003.443184] ? __tcp_select_window+0x9f0/0x9f0 [ 1003.447758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1003.453291] ? tcp_fastopen_active_should_disable+0x269/0x340 [ 1003.459175] ? __lock_is_held+0xb5/0x140 [ 1003.463269] ? uart_throttle+0x298/0x6e0 [ 1003.467334] ? tcp_fastopen_cookie_check+0xc9/0x470 [ 1003.472346] ? tcp_fastopen_active_should_disable+0x340/0x340 [ 1003.478221] ? tcp_rbtree_insert+0x141/0x190 [ 1003.482623] tcp_connect+0x2320/0x46e0 [ 1003.486508] ? tcp_push_one+0x110/0x110 [ 1003.490489] ? ktime_get_with_offset+0x38b/0x470 [ 1003.495256] ? pvclock_read_flags+0x160/0x160 [ 1003.499762] ? secure_tcpv6_seq+0x233/0x350 [ 1003.504100] ? trace_hardirqs_off_caller+0x310/0x310 [ 1003.509231] ? kvm_clock_read+0x18/0x30 [ 1003.513213] ? ktime_get_with_offset+0x310/0x470 [ 1003.517968] ? ktime_get+0x400/0x400 [ 1003.521681] ? __siphash_aligned+0x1c3/0x330 [ 1003.526078] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1003.531602] ? siphash_4u64+0x25/0x3c0 [ 1003.535486] ? secure_tcpv6_ts_off+0x2b8/0x430 [ 1003.540074] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1003.545617] ? tcp_fastopen_defer_connect+0x173/0x4a0 [ 1003.550815] ? tcp_fastopen_cookie_check+0x470/0x470 [ 1003.555925] ? rcu_note_context_switch+0x138e/0x2150 [ 1003.561041] ? prandom_u32_state+0x13/0x180 [ 1003.565360] tcp_v6_connect+0x1c0f/0x29b0 [ 1003.569510] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 1003.574080] ? unwind_get_return_address+0x61/0xa0 [ 1003.578998] ? __save_stack_trace+0x8d/0xf0 [ 1003.583328] ? save_stack+0xa9/0xd0 [ 1003.586943] ? save_stack+0x43/0xd0 [ 1003.590558] ? kasan_kmalloc+0xc7/0xe0 [ 1003.594434] ? kmem_cache_alloc_trace+0x152/0x750 [ 1003.599267] ? tcp_sendmsg_locked+0x29ad/0x3fa0 [ 1003.603925] ? tcp_sendmsg+0x2f/0x50 [ 1003.607638] ? inet_sendmsg+0x1a1/0x690 [ 1003.611613] ? sock_sendmsg+0xd5/0x120 [ 1003.615492] ? __sys_sendto+0x3d7/0x670 [ 1003.619465] ? __x64_sys_sendto+0xe1/0x1a0 [ 1003.623691] ? do_syscall_64+0x1b9/0x820 [ 1003.627763] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1003.633139] ? print_usage_bug+0xc0/0xc0 [ 1003.637201] ? zap_class+0x640/0x640 [ 1003.640911] __inet_stream_connect+0x992/0x1150 [ 1003.645568] ? __inet_stream_connect+0x992/0x1150 [ 1003.650409] ? inet_dgram_connect+0x2e0/0x2e0 [ 1003.654890] ? __lock_is_held+0xb5/0x140 [ 1003.658948] ? tcp_sendmsg_locked+0x29ad/0x3fa0 [ 1003.663656] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1003.668680] ? kmem_cache_alloc_trace+0x353/0x750 [ 1003.673517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1003.679057] tcp_sendmsg_locked+0x2b37/0x3fa0 [ 1003.683546] ? debug_smp_processor_id+0x1c/0x20 [ 1003.688209] ? lock_is_held_type+0x210/0x210 [ 1003.692616] ? tcp_sendpage+0x60/0x60 [ 1003.696429] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1003.701996] ? find_held_lock+0x36/0x1c0 [ 1003.706079] ? mark_held_locks+0xc7/0x130 [ 1003.710216] ? __local_bh_enable_ip+0x160/0x260 [ 1003.714871] ? __local_bh_enable_ip+0x160/0x260 [ 1003.719548] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1003.724122] ? trace_hardirqs_on+0xbd/0x310 [ 1003.728432] ? lock_release+0xa00/0xa00 [ 1003.732408] ? lock_sock_nested+0xe2/0x120 [ 1003.736643] ? trace_hardirqs_off_caller+0x310/0x310 [ 1003.741737] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1003.747265] ? check_preemption_disabled+0x48/0x280 [ 1003.752274] ? lock_sock_nested+0x9a/0x120 [ 1003.756505] ? lock_sock_nested+0x9a/0x120 [ 1003.760731] ? __local_bh_enable_ip+0x160/0x260 [ 1003.765401] tcp_sendmsg+0x2f/0x50 [ 1003.768937] inet_sendmsg+0x1a1/0x690 [ 1003.772747] ? ipip_gro_receive+0x100/0x100 [ 1003.777077] ? apparmor_socket_sendmsg+0x29/0x30 [ 1003.781839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1003.787392] ? security_socket_sendmsg+0x94/0xc0 [ 1003.792156] ? ipip_gro_receive+0x100/0x100 [ 1003.796481] sock_sendmsg+0xd5/0x120 [ 1003.800190] __sys_sendto+0x3d7/0x670 [ 1003.803981] ? __ia32_sys_getpeername+0xb0/0xb0 [ 1003.808657] ? wait_for_completion+0x8a0/0x8a0 [ 1003.813275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1003.818838] ? __sb_end_write+0xd9/0x110 [ 1003.822908] ? fput+0x130/0x1a0 [ 1003.826178] ? do_syscall_64+0x9a/0x820 [ 1003.830155] ? do_syscall_64+0x9a/0x820 [ 1003.834136] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1003.838706] ? trace_hardirqs_on+0xbd/0x310 [ 1003.843014] ? __ia32_sys_read+0xb0/0xb0 [ 1003.847075] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1003.852431] ? trace_hardirqs_off_caller+0x310/0x310 [ 1003.857539] __x64_sys_sendto+0xe1/0x1a0 [ 1003.861606] do_syscall_64+0x1b9/0x820 [ 1003.865488] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1003.870840] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1003.875756] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1003.880603] ? trace_hardirqs_on_caller+0x310/0x310 [ 1003.885626] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1003.890633] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1003.895658] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1003.900497] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1003.905674] RIP: 0033:0x457569 [ 1003.908870] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1003.927921] RSP: 002b:00007f4f2bdd5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1003.935629] RAX: ffffffffffffffda RBX: 00007f4f2bdd5c90 RCX: 0000000000457569 [ 1003.942888] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000004 [ 1003.950163] RBP: 000000000072bfa0 R08: 0000000020000080 R09: 000000000000001c [ 1003.957428] R10: 0000000020000003 R11: 0000000000000246 R12: 00007f4f2bdd66d4 [ 1003.964738] R13: 00000000004c3b78 R14: 00000000004d5ca8 R15: 0000000000000006 19:04:38 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:38 executing program 4: mount(&(0x7f0000000000)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x10, &(0x7f0000000100)='\x00') r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x10000000000000) 19:04:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:38 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000002], &(0x7f0000000140)}) 19:04:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1004.075304] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1004.101501] QAT: Stopping all acceleration devices. 19:04:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x2000000) [ 1004.143429] QAT: Stopping all acceleration devices. 19:04:38 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1fffffff], &(0x7f0000000140)}) [ 1004.192138] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:38 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) socket$inet(0x2, 0x804, 0x2) r1 = inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x0) inotify_rm_watch(r0, r1) 19:04:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0xf0ffffff00000000) 19:04:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x218, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1004.360144] QAT: Stopping all acceleration devices. [ 1004.372712] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1004.438593] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1004.451378] QAT: Stopping all acceleration devices. 19:04:39 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x7f000000) 19:04:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x40020000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:39 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0xfffffffffffffffd, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x100000001) uselib(&(0x7f00000000c0)='./file0\x00') 19:04:39 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x2000000], &(0x7f0000000140)}) [ 1005.041579] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1005.065176] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1005.085934] kauditd_printk_skb: 13 callbacks suppressed 19:04:39 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400102, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'ah\x00'}, &(0x7f00000000c0)=0x1e) ioctl$sock_inet_SIOCSARP(r1, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 1005.085948] audit: type=1326 audit(1540926279.346:5074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24712 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:04:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x7f00) [ 1005.141562] audit: type=1804 audit(1540926279.386:5075): pid=24706 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1721/file0" dev="sda1" ino=17220 res=1 19:04:39 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000, 0x2], &(0x7f0000000140)}) 19:04:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:39 executing program 4: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x1) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x4e21, @remote, [0xfe, 0x60000000]}, {0x0, @local}}) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000080)={0x3, 0x1, [{0x100000001, 0x0, 0xfbe}, {0x5, 0x0, 0x6}, {0x8, 0x0, 0x6}]}) [ 1005.193177] QAT: Stopping all acceleration devices. [ 1005.201731] audit: type=1804 audit(1540926279.436:5076): pid=24720 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1721/file0" dev="sda1" ino=17220 res=1 19:04:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x10) [ 1005.346365] QAT: Stopping all acceleration devices. [ 1005.353705] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1005.365255] QAT: Invalid ioctl [ 1005.375537] QAT: Stopping all acceleration devices. [ 1005.383643] audit: type=1804 audit(1540926279.646:5077): pid=24735 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1722/file0" dev="sda1" ino=17243 res=1 [ 1005.455073] audit: type=1804 audit(1540926279.716:5078): pid=24743 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1722/file0" dev="sda1" ino=17243 res=1 19:04:40 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:40 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000000)="17e2ee5cf349fa7a79a10478451d1062598f4fdb47f70dbecd0765b405bd718f58178aabdc0c3fbeb3785273f03dd4") ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0xfffffff0) 19:04:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:40 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000, 0x200000000000000], &(0x7f0000000140)}) 19:04:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xfc000000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1005.884818] audit: type=1326 audit(1540926280.146:5079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24712 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1005.990691] QAT: Invalid ioctl [ 1006.000362] QAT: Stopping all acceleration devices. [ 1006.013699] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1006.021682] QAT: Invalid ioctl 19:04:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x2dddff7f00000000) [ 1006.024648] audit: type=1326 audit(1540926280.276:5080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24759 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1006.027946] QAT: Stopping all acceleration devices. [ 1006.052736] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:40 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000, 0x100000000000000], &(0x7f0000000140)}) 19:04:40 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) sendfile(r0, r0, &(0x7f0000000000), 0x101) [ 1006.103666] audit: type=1804 audit(1540926280.366:5081): pid=24752 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1723/file0" dev="sda1" ino=17234 res=1 19:04:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1006.181437] audit: type=1804 audit(1540926280.416:5082): pid=24768 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1723/file0" dev="sda1" ino=17234 res=1 [ 1006.208594] QAT: Stopping all acceleration devices. [ 1006.240074] QAT: Stopping all acceleration devices. 19:04:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x200000000000000) 19:04:40 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000, 0x1000000], &(0x7f0000000140)}) [ 1006.321994] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1006.356863] audit: type=1804 audit(1540926280.616:5083): pid=24783 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1724/file0" dev="sda1" ino=17241 res=1 19:04:41 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:41 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x8dffffff00000000) 19:04:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:41 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000, 0x2000000], &(0x7f0000000140)}) 19:04:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x5000000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1006.937145] QAT: Stopping all acceleration devices. 19:04:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x700) 19:04:41 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000080)=""/217, &(0x7f0000000000)=0xd9) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000180)={0x77359400}, 0x10) 19:04:41 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)=0x100000000000000}) 19:04:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1007.070294] QAT: Stopping all acceleration devices. [ 1007.083802] QAT: Stopping all acceleration devices. 19:04:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x7fffdd2d) 19:04:41 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000080)=""/158, 0x9e, 0x0) signalfd4(r1, &(0x7f0000000000)={0x7}, 0x8, 0x80000) ioctl$sock_inet_SIOCSARP(r1, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 1007.217950] QAT: Stopping all acceleration devices. 19:04:42 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x7f00000000000000) 19:04:42 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) ppoll(&(0x7f0000000000)=[{r0, 0x8001}], 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x8) 19:04:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:42 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)=0x200000000000000}) 19:04:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x5860da3b, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1007.850291] QAT: Stopping all acceleration devices. [ 1007.868143] QAT: Stopping all acceleration devices. 19:04:42 executing program 4: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40200, 0x0) socket$inet6(0xa, 0xa, 0xfd) 19:04:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) socketpair(0x1, 0x4, 0xa947, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:42 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)=0x2000000}) 19:04:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc7f0000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:42 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)=0x1000000}) 19:04:42 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sm4)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000001100)=ANY=[], 0xff99) r1 = dup(r0) syz_open_pts(r1, 0x2) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000011c0)={@remote, @rand_addr, 0x0}, &(0x7f0000001200)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000001280)={@ipv4={[], [], @loopback}, 0x2d, r2}) recvmsg(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x2fb, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:42 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)=0x2}) 19:04:42 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:42 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc7f]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='ecb-cast5-avx\x00', 0x5) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001280)=0x0) getresuid(&(0x7f00000012c0), &(0x7f0000001300)=0x0, &(0x7f0000001340)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001380)={0x0, 0x0, 0x0}, &(0x7f00000013c0)=0xc) r6 = fcntl$getown(r0, 0x9) r7 = geteuid() stat(&(0x7f0000001980)='./file0\x00', &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = fcntl$getown(r0, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a40)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000001b40)=0xe8) fstat(r0, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = gettid() getresuid(&(0x7f0000001ec0)=0x0, &(0x7f0000001f00), &(0x7f0000001f40)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001f80)={0x0, 0x0, 0x0}, &(0x7f0000001fc0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002000)={0x0}, &(0x7f0000002040)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002080)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000002180)=0xe8) lstat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r18 = getpgid(0xffffffffffffffff) r19 = getuid() r20 = getegid() r21 = getpid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002780)={0x0, 0x0}, &(0x7f00000027c0)=0xc) getresgid(&(0x7f0000002800)=0x0, &(0x7f0000002840), &(0x7f0000002880)) r24 = getpgrp(0x0) r25 = geteuid() lstat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002980)=0x0) r28 = getuid() fstat(r0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r30 = fcntl$getown(r1, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002a40)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000002b40)=0xe8) getresgid(&(0x7f0000002b80)=0x0, &(0x7f0000002bc0), &(0x7f0000002c00)) sendmmsg$unix(r2, &(0x7f0000002d80)=[{&(0x7f0000001100)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001180)=[{&(0x7f00000000c0)="038a841ee3d1f8f949ac246cb8f3a238f59da6", 0x13}], 0x1, &(0x7f0000001480)=[@rights={0x18, 0x1, 0x1, [r1]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x20, 0x1, 0x1, [r1, r1, r1, r1]}], 0x58}, {&(0x7f0000001500)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001900)=[{&(0x7f0000001580)="16506f71760a9e9d986428653813d8894236ea5efcdcff4929416fc9a9aad94557a86f1ca542674aa35c27ae7738331bf679ebfdeabb2e391160eb170e2e55c412576a5ca564bd0efb30d07fa8", 0x4d}, {&(0x7f0000001600)="5712814f8ecb3149edd32d8c68d61c40f05eb209d94187bb5425687393a779a02ea1ed1778817f0b3fc44df113b694a6867fec0220d29f470e478ee93cbdcd9150f9f9b3de5ba2537f1a3517acde6897a74428705b34c40a76cb2c00a242c6f4da0cd1aaac1f961d1ec1d126be7c9e18660e984229b48feafd3b4e98ce236438ab791b87cb091d0192b99bf8ef876269fc83ace0fc3736ab25cbf2d3be66f6", 0x9f}, {&(0x7f00000016c0)="52fcc1a93f10e7edd6fc1e83bfb09a5387c7860329046995419b5df2a34ccd351d987ccdad1caac29b485154397af4c14438c44006c0effd796950396a323a67fe7eaf04cd597ba88152970d2e79d7b50a501af69d5844230833e7333132e102d36271bcfdba036ab9bc078d17582857615bda5f53bdc60893bd81559cb8a569ad4e342af7b10806069bf84f02407c749efd6f98ec560738a49e04614b56df1d700eea99913efbe4", 0xa8}, {&(0x7f0000001780)="61edb1500df970bfe8f0a8ea4890d57b7a53ff82d35aa823b50094f6c5dac4789bc5f30f", 0x24}, {&(0x7f00000017c0)="3ca17127a400822ea9bdfd60249d2da02ed07cef89769b01802352ba5a4de17d0b5f89dc6225906d9da18fe4c138f29aec00bdc682229aeac4957b2a728d0ce390ea66c3bb6601da87a3a2a281934cd073ab6fe2f70ccd363804e1cf7a6d15d6eb1451f67e222b6bdd3e9fd1544bd6c1c37c544f2b", 0x75}, {&(0x7f0000001840)="ba5c265203bd87af040c45f73041fdcc796c5caff641312cafd0a6866f6319741e718148835173496d105a951f2bcff2d0df17598e12b55d38d9a87dff35d13d685a9bf460148553919c759a0e30b47dd42c6af9ba677288b89ed1feb6f250b2cd5a265dae497a1673a7a88d6ecb642412aa0144c3d15d883bf132de7b17d5f8ac98ba435d35dc34eaab7155b95f396d6cf23bf495fd3259f6bcacb1ebf1f295e53d6383df109f4e73cd178b361860d8be4eb4a2b35401", 0xb7}], 0x6, &(0x7f0000001c00)=[@cred={0x20, 0x1, 0x2, r6, r7, r8}, @rights={0x30, 0x1, 0x1, [r1, r0, r0, r1, r0, r1, r0, r1]}, @cred={0x20, 0x1, 0x2, r9, r10, r11}], 0x70, 0x4000000}, {&(0x7f0000001c80)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000001e80)=[{&(0x7f0000001d00)="08b82fd9d40f1bb1ff7767c1be4e7da0e9f0171a2d0458ba74214709590b1bd34b799e3e99987a789e2176d28dd65b5e9335575ff5f1438f824c8b02a541aec4b88d7f56f71621bf2637e6ff8c085f82abecd27162abf727886cb22a03299c242c37e78faef8e60fd5564e48505fad0b83115ee15d795bbffb32bd6e32b7", 0x7e}, {&(0x7f0000001d80)="a2f1e312b3e99090f6f6309442a14f1e89e7050b136fb335853aacff04b0adc4c0a8c9569d51886eb9b79e05bb0b8492cc03cf4501fa6d749ad7f27f997117b97359754ead8507bc357d5586dfa5deb9034601f11ee4b94725beac5797d92913004068e678094087b8bc822469d4479b19d3b7c0ab9bb5097b3599dbe64407394934bf07d992e6e1c5bff2db9e8a4f4f7b639fbbcb1ce9e8377b489039bb9377d5046811ac268326515fe6daae57f1940ef6f28dc57b5b2f587e9d259093e30d97429d562632405cfcb9e7b29c82e0f0675d25dd677a3b3444a967470f59d3cb18fc2c0782d7c71a584bc983923c52826410900dad2eb84c3eb1", 0xfa}], 0x2, &(0x7f0000002280)=[@rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r1, r0]}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @rights={0x28, 0x1, 0x1, [r1, r1, r1, r0, r0, r0]}], 0xb0, 0x20008050}, {&(0x7f0000002340)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000002700)=[{&(0x7f00000023c0)="bef13607bff0122b7bc03d713d448d661fa638eb7bfb8cb75fc4d47ef90dd911c18543d4b7d5d9cfb07456df194bc1c6419e199107822faf84c48e081f6ca8e432fa4d09f25421e64c2d66dc60c93b2c715dad34d6deb51a8b98", 0x5a}, {&(0x7f0000002440)="35f81979b29b0667b5c5af42c3e2332a315f3d4be86162a5d59f6587cc20a2aa298826cddac3113ebf970f0768b773a3c5c0", 0x32}, {&(0x7f0000002480)="c8d1046916b1d7693b0938d90388cc71295ddd25edc437083803943b89a167408a7232658de702451e9060d38de18b7dce63a1d28f6e74f9165ed4ee80be5c67984ebfca51479145629442b910cb2f6e94d207247ab50ecf1432dc71", 0x5c}, {&(0x7f0000002500)="c9ccb27277ffb8b09c92b50492c3667f003571c4b0c5d1e548993810dfe7c0ce59c9288658612ae5ef19b3bfeac9952255238d725ba16a71630bd57018f19259e743ef2c4fae03e3b0b5bfc59254014dfa5b9cb57056764a9d9746c9ca085dedae30e7e4d998291f966126e4", 0x6c}, {&(0x7f0000002580)="0e361c9f107468046907fcc0fbfd52e201b02de496a071582718c74b45d658e3639d", 0x22}, {&(0x7f00000025c0)="532c90fa96c312306fa5e35525586036ce537b1d9faa54cac9f801582816af84a1ebf6a23ec661e6a0533ebc111b91a4ed7ec1905005640a161251bbbf", 0x3d}, {&(0x7f0000002600)="c4a1df696655af9d0e01462dc92fb89f5246c3cd88a7ebdb409891fb2bc6bfb6ace92c04448626750b604a0e8cbfb16049b0971aa101a4c45650d0b3b5f908a3354c0defb04e6c5cd647eae69a51a85328a1ad8962c00e5d0f401b9bafe6dc109aef049b951f1fdafa894132c4c80466d74be7969e346962994f36255f5ab63f373b8aeccf5fa931a3a39b7f1fba505603c3d30cb36875331c25c64e23b5efd8f70414e95d079f6a719f7cc84622989b9c2cc8c93e85f6ced40f14674485e5b9707021cc7df8e196069c99827d2e4fca6c03b055889ee27fd853d7dea32f4bb558b49fa8847b0a1e06f6695e055dec8d39bb778fc37e", 0xf6}], 0x7, &(0x7f0000002c40)=[@cred={0x20, 0x1, 0x2, r18, r19, r20}, @cred={0x20, 0x1, 0x2, r21, r22, r23}, @cred={0x20, 0x1, 0x2, r24, r25, r26}, @rights={0x28, 0x1, 0x1, [r0, r1, r0, r0, r1, r1]}, @rights={0x28, 0x1, 0x1, [r0, r1, r0, r1, r1]}, @rights={0x18, 0x1, 0x1, [r1, r1]}, @cred={0x20, 0x1, 0x2, r27, r28, r29}, @cred={0x20, 0x1, 0x2, r30, r31, r32}], 0x108, 0x40000}], 0x4, 0x10) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3f00, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1008.779615] QAT: Stopping all acceleration devices. 19:04:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x809, 0x2) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @dev, @dev}, &(0x7f0000001100)=0xc) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000001140)={r2, 0x1, 0x6, @remote}, 0x10) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r3, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:43 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x4, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40000, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x0) 19:04:43 executing program 4: r0 = inotify_init() preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/113, 0x71}, {&(0x7f0000000100)=""/164, 0xa4}, {&(0x7f0000000000)=""/57, 0x39}], 0x3, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xfffffff5, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:43 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x81, 0x400442) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000100)={0x16, 0xc4, &(0x7f00000001c0)="9c10e73289f867e481f4873c5b83c5a1c15ec3ab3edd02f52826824a9dea634479df49a07d1cfa0fcfd6e22297c0f85d0243d28777af061adfbd092f82401772a90b177abf209c0194d8e37cfcdc80ff11805ea277208fb347b9098aa470d97f85550d5ae79432d6cee206b99bfacf00e390d5b9c37affcfd2bbfd6e73536ba8bb17b0d476d3741f4e502fe96d6e2e9e43305e5512de7026b73e61d5be9b6594d0d7ecd2701c53320bbdbbd88bd8420033af33e0842179a7bbc5d47501faa11112d7fdf4"}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r1, &(0x7f0000000100), 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0xffffffff00000001, 0x288000) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000000180)={0x8000, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000]}) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x4202, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x10400, 0x0) [ 1008.979121] QAT: Stopping all acceleration devices. [ 1009.010325] QAT: Stopping all acceleration devices. 19:04:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000001100)='/dev/vhci\x00', 0x181000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001280)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000001140)=0xe8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x2000000, &(0x7f0000001480)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl='posixacl'}, {@nodevmap='nodevmap'}], [{@dont_appraise='dont_appraise'}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@fowner_lt={'fowner<', r2}}, {@subj_user={'subj_user', 0x3d, 'nodev['}}, {@fsuuid={'fsuuid', 0x3d, {[0x3d, 0x31, 0x32, 0x36, 0x35, 0x0, 0x73, 0x30], 0x2d, [0x37, 0x39, 0x66, 0x7f], 0x2d, [0x37, 0x66, 0x77, 0x35], 0x2d, [0x73, 0x65, 0x77, 0x33], 0x2d, [0x65, 0x7f, 0x62, 0x7d, 0x63, 0x30, 0x65, 0x77]}}}, {@fsname={'fsname', 0x3d, 'skcipher\x00'}}, {@seclabel='seclabel'}]}}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r3, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:43 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:43 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x4, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x7fffffff, 0x80000) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000001100)={[{0x0, 0xffffffffffffffb6, 0x39, 0xffffffffffffffff, 0x8000, 0x80000000, 0x0, 0x40, 0x9a45, 0x3ff, 0x3, 0x100000000, 0x2}, {0x6, 0x78b, 0x6, 0x0, 0x3, 0x7fff, 0x1a, 0x8, 0x1ff, 0x6, 0x80000001, 0x37f}, {0x9, 0xb75a, 0xffffffff00000001, 0x0, 0xfffffffffffffff7, 0x7, 0x100000000, 0x5, 0x10000, 0x3ff, 0x8, 0x4, 0x100000001}], 0x8001}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000001380)={{0x8001, 0x100}, {0xeb1, 0x2}, 0x7fad8429, 0x3, 0x400}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r2 = accept$alg(r0, 0x0, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000001280)={[0x5, 0x9, 0xffffffff80000000, 0x19cd, 0x65, 0x982, 0x2, 0x207a, 0xd3e, 0x627, 0x7, 0x1f, 0xffffffff80000001, 0x667, 0x401, 0x971], 0x0, 0x4}) write$binfmt_elf32(r2, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001340)={'nr0\x00', &(0x7f00000014c0)=@ethtool_rxfh={0x46, 0x8, 0x1f, 0x7, 0x2, "d84205", 0x8ae5, [0x1, 0x7, 0xcd8, 0x4, 0x7, 0x3, 0x1, 0x3]}}) 19:04:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:43 executing program 3: r0 = inotify_init1(0x80800) r1 = geteuid() fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x73ea, 0x24a7}, {0x1, 0xc5b}], r1}, 0x18, 0x2) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0xe6c1, 0x4000040) read(r2, &(0x7f0000000080), 0xe5d0683c74f3369f) ioctl$VIDIOC_SUBDEV_S_EDID(r2, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)=0x4}) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000000)={0xa, {0x42d, 0x401, 0xa9, 0x7fffffff}, {0x6, 0x7, 0x8001, 0x7fff}, {0x0, 0x80000000}}) [ 1009.663285] net_ratelimit: 10 callbacks suppressed [ 1009.663296] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1009.685889] QAT: Stopping all acceleration devices. 19:04:44 executing program 4: setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+', 0x9}, 0x28, 0x2) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:44 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x6, 0x8000000000000000) socket$vsock_dgram(0x28, 0x2, 0x0) read(r1, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) accept$alg(r0, 0x0, 0x0) fcntl$setsig(r0, 0xa, 0x0) r1 = accept$alg(r0, 0x0, 0x0) getegid() write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x100000001, 0x5, 0xff, 0x7fff, 0x7}, &(0x7f0000001100)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000001140)=@sack_info={r3, 0x1, 0x29}, &(0x7f0000001180)=0xc) [ 1009.811192] QAT: Stopping all acceleration devices. [ 1009.835666] QAT: Stopping all acceleration devices. 19:04:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x200001c0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:44 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x1, 0x40000402600) read(r0, &(0x7f0000000200), 0x91) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r2 = semget$private(0x0, 0x4, 0x0) clock_gettime(0x1, &(0x7f0000000200)={0x0, 0x0}) semtimedop(r2, &(0x7f0000000080)=[{0x5, 0x4, 0x1000}], 0x1, &(0x7f00000001c0)={r3, r4+30000000}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000100)="b99190f100", 0xfe18) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:44 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8180, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 1009.992928] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1010.046334] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1010.094626] kauditd_printk_skb: 24 callbacks suppressed [ 1010.094673] audit: type=1804 audit(1540926284.356:5108): pid=25000 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1732/file0" dev="sda1" ino=16580 res=1 19:04:44 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:44 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000140)={0x2000, 0x1000}) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000000)=""/8) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000100)=0x5, 0x4) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x3) 19:04:44 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x210001) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000740)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0, 0x0}, &(0x7f00000007c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000800)={{{@in=@broadcast, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000900)=0xe8) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000a00)={0x338, 0x0, 0x3, [{{0x5, 0x3, 0xa44, 0x3, 0x6, 0x4, {0x2, 0x7, 0x100000000, 0x9, 0x0, 0x7fff, 0x8001, 0x1000, 0x80000000, 0x6, 0x7, r2, r3, 0x3}}, {0x6, 0x1, 0x5, 0x101, 'nodev'}}, {{0x3, 0x2, 0x4, 0x1, 0x8, 0x7fff, {0x0, 0x80000000, 0x3, 0x0, 0xfffffffffffffffa, 0x1, 0x2, 0x7fff, 0x3ff, 0x2, 0x0, r4, r5, 0x1, 0x7f}}, {0x5, 0x400, 0xc, 0x99c, '/dev/video#\x00'}}, {{0x4, 0x0, 0x5, 0x9, 0x9, 0x9, {0x4, 0x3f, 0x3d, 0x8001, 0x8, 0x5b9, 0x7f, 0x629, 0x6f000000, 0x100000001, 0x0, r6, r7, 0x68, 0xedb}}, {0x0, 0x54, 0xc, 0x7, '/dev/video#\x00'}}, {{0x6, 0x0, 0x8, 0x7fffffff, 0xf4, 0x3ff, {0x4, 0x6, 0x6, 0x8, 0x1f, 0x5, 0x0, 0x3f, 0x2, 0x14, 0x4, r8, r9, 0x100, 0x9}}, {0x4, 0x800, 0x3, 0x8, 'em1'}}, {{0x6, 0x1, 0x0, 0xbdb1, 0x9, 0xfffffffffffffeff, {0x2, 0xffffffffffffff54, 0x21, 0x8001, 0x7, 0x9, 0xfffffffffffffffd, 0x4, 0x7, 0xa07, 0x5, r10, r11, 0x7, 0x800}}, {0x2, 0x40, 0x0, 0x8}}]}, 0x338) 19:04:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x3, 0x880) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[@ANYRESHEX=r2, @ANYRES32, @ANYRES16=r0], 0x34e) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 1010.518909] audit: type=1326 audit(1540926284.776:5109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24968 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1010.602290] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) r2 = socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000001140)=0x8001, 0x2) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 1010.644883] QAT: Stopping all acceleration devices. [ 1010.650111] audit: type=1326 audit(1540926284.906:5110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25009 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1010.678812] QAT: Invalid ioctl [ 1010.688145] QAT: Invalid ioctl [ 1010.697845] QAT: Stopping all acceleration devices. [ 1010.700599] audit: type=1804 audit(1540926284.946:5111): pid=25007 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1733/file0" dev="sda1" ino=17393 res=1 [ 1010.712145] QAT: Invalid ioctl 19:04:45 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9, 0x1) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000001c0)={[0x4, 0x40, 0xa1, 0x1, 0x4, 0x5, 0xff, 0x7fffffff, 0x40, 0xffffffffffffff2d, 0x8, 0xffff, 0x7, 0x8, 0x4, 0x3], 0x4, 0x10000}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x4, 0xc3, [], 0x1, &(0x7f0000000040)=[{}], &(0x7f0000000280)=""/195}, &(0x7f0000000080)=0x78) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r1, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 1010.744147] audit: type=1804 audit(1540926285.006:5112): pid=25018 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1733/file0" dev="sda1" ino=17393 res=1 19:04:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x5, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xffffffffffffff4d) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x80040, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000000c0)={'veth0_to_team\x00', 0x400}) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000001100)=ANY=[], 0xff99) close(r0) recvmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001280)={{{@in6=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001180)=0xe8) stat(&(0x7f0000001380)='./file0\x00', &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='fuse\x00', 0x2000000, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, 'skcipher\x00'}}, {@dont_appraise='dont_appraise'}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}}) 19:04:45 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x4007fe, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 1010.903874] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:45 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000140)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x2000, 0x1}) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={r1, 0x2}, &(0x7f0000000100)=0x8) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = syz_open_dev$usb(&(0x7f0000001480)='/dev/bus/usb/00#/00#\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f00000014c0)={0x3, 0x1, [0x1, 0x5, 0x6, 0xa30, 0x6, 0x9, 0x8c2, 0x100000001]}) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000001280)=ANY=[@ANYRESHEX=r2, @ANYRES32=r2, @ANYBLOB="5f4bd90b5e730f8e199472c8bd91ed3aa599ce5b34f9f79c383e9396baedfc3cb1addda2ca7b3c7e00f0cbef8603d6fd25d8b6965cb9a35466a689c883db9291d794d49f8174e8f31793dfb340fd6908b3f5a68da507269b9d42693396a34cc1fe76d3f6188c778ae6664b5d244356de7da6883834ef995797c6b6920a2728cf000d83adfca7d4", @ANYRESDEC=r2, @ANYRESHEX=r2], 0xc3) r3 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x87, 0x88000) pipe2(&(0x7f0000001380)={0xffffffffffffffff}, 0x4000) ioctl$VIDIOC_EXPBUF(r3, 0xc0405610, &(0x7f00000013c0)={0xc, 0x5, 0x83d, 0x80000, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$sock_bt_hci(r5, 0xc00448fd, &(0x7f0000001100)="bdf2b1a304e754c6951b0773037fc1ac4c3d7fa8b20b3ca8b6d69bcb903ce30eac3d40eb21b3f81f964c64fe4eeed758692d72d044475d0420a091d28f4c5fe79847a2481136e2b4f9decfdc6f18f7e5efda3622e439d3d7896a4ba983ebee62080b611d4cb9f58cb9faa8f055a1cc970e53b403191cdea1f8dbcda6948affd71fbda0edb0f9606667e483987862fd48fb0e0ff92bf1ddecfb01f7aee267f29bad94265b784e52b21c78eaa323da22e6b00211dccd0f") recvmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 1010.944006] audit: type=1804 audit(1540926285.206:5113): pid=25035 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1734/file0" dev="sda1" ino=17361 res=1 [ 1010.982152] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1011.029072] audit: type=1804 audit(1540926285.286:5114): pid=25046 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1734/file0" dev="sda1" ino=17361 res=1 [ 1011.060535] QAT: Invalid ioctl [ 1011.067901] QAT: Stopping all acceleration devices. [ 1011.086519] QAT: Invalid ioctl [ 1011.112288] QAT: Stopping all acceleration devices. 19:04:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x7, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000001500)=ANY=[@ANYPTR], 0x12b) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) execveat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000001140)=[&(0x7f0000001100)='skcipher\x00'], &(0x7f0000001480)=[&(0x7f0000001180)='ecb-cast5-avx\x00', &(0x7f0000001280)='\x00', &(0x7f00000012c0)='ecb-cast5-avx\x00', &(0x7f0000001300)='self%\x00', &(0x7f0000001340)='trusted\x00', &(0x7f0000001380)='skcipher\x00', &(0x7f00000013c0)='ecb-cast5-avx\x00'], 0x100) 19:04:45 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) getcwd(&(0x7f0000000040)=""/24, 0x18) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') 19:04:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1900]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:45 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000000)) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:45 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) [ 1011.447737] audit: type=1326 audit(1540926285.706:5115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25009 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1011.541471] QAT: Invalid ioctl [ 1011.553009] QAT: Stopping all acceleration devices. [ 1011.556619] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1011.572514] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1011.587051] QAT: Invalid ioctl 19:04:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001100)="97b7f2288a931da5991545bf90b032", 0xf) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001480)="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", 0x1000) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000002480)='/dev/sequencer\x00', 0x200000000a00, 0x0) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000001380)={0x1}) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in=@rand_addr, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000001140)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001180)={'dummy0\x00', r3}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000013c0)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x2}) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:45 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000180)={{0x2, 0x0, @loopback, [0xfe, 0x60000000]}, {0x0, @local}, 0x6, {0x2, 0x0, @local}}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x10000, {0x2, 0x4e22}, {0x2, 0x4e21}, {0x2, 0x4e21, @rand_addr=0x8df}, 0x40, 0x5, 0x2, 0x80, 0x10001, &(0x7f0000000000)='bpq0\x00', 0x3, 0x5, 0x80000000}) 19:04:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xff0f0000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1011.598727] QAT: Stopping all acceleration devices. [ 1011.604240] audit: type=1326 audit(1540926285.866:5116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25073 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:04:45 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x10000, 0x0) r2 = getuid() stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r1, &(0x7f0000000500)={0xa0, 0x19, 0x2, {0x400, {0xc0, 0x4, 0x8}, 0x10, r2, r3, 0x3, 0x4, 0x42c, 0x7fff, 0x5, 0x7, 0x9, 0x0, 0x9, 0x4, 0x7fffffff, 0x3, 0x4, 0x101, 0x80000000}}, 0xa0) ioctl$FIONREAD(r1, 0x541b, &(0x7f00000002c0)) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000300)={0x0, 0xff}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000380)={r4, 0x80000000, 0x30, 0x9e073dd, 0x20}, &(0x7f0000000400)=0x18) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x20000, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000)=0xfab, 0x4) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@multicast1, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000100)=0xe8) [ 1011.713834] audit: type=1804 audit(1540926285.976:5117): pid=25065 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1735/file0" dev="sda1" ino=16706 res=1 [ 1011.776451] QAT: Stopping all acceleration devices. [ 1011.784012] QAT: Invalid ioctl [ 1011.802214] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1011.810396] QAT: Stopping all acceleration devices. 19:04:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1802]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1011.827353] QAT: Invalid ioctl 19:04:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x80, 0x8200) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000001100)={0x0, 0x8a, "1a10b0ee1407b6c376f51793aa6a3a62a7d4e46b1665f716598d1195222ca4e13631542e986e1703563ba1579628d17d0a0231de42dadcaedfd34438d2015226b54205d57379ff9b6289f8df39fc44990804ab20f9d24248960f0f3ae044abdb3144cfdf8c60db1976681ceae599eab3432295cfd457edb1c2ba945677094c9c87651176105d57a1a73f"}, &(0x7f00000000c0)=0x92) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000001280)={r3, 0x5, 0x4, 0x8000, 0x60d1, 0x20}, &(0x7f00000012c0)=0x14) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:46 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x6, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000240)={0x101, {{0x2, 0x4e20}}, 0x0, 0x3, [{{0x2, 0x4e20}}, {{0x2, 0x4e21}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}]}, 0x210) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r1, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000000080)={0x3, 0x0, 0x3, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000040)}) r2 = socket(0x11, 0x3, 0x1) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L-', 0x3ff}, 0x28, 0x2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x60, r3, 0x1, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x10) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f00000001c0)={{0x77, @multicast2, 0x4e21, 0x2, 'nq\x00', 0x4, 0x7, 0x39}, {@dev={0xac, 0x14, 0x14, 0x15}, 0x4e23, 0x5, 0x94, 0x4, 0xbf22}}, 0x44) [ 1011.921925] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:46 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x0}) 19:04:46 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x80000000, 0x0) inotify_add_watch(r0, &(0x7f0000000280)='./file0\x00', 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3ff, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000080)={&(0x7f0000ff9000/0x4000)=nil, 0xffffffffffffffd0, 0x3, 0x85, &(0x7f0000ffc000/0x3000)=nil, 0x7}) getsockname(r1, &(0x7f00000000c0)=@xdp, &(0x7f0000000140)=0x80) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x111840, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) bind$netlink(r1, &(0x7f0000000180)={0x10, 0x0, 0x25dfdbfc, 0xfffffffffffffffd}, 0x39339b3aff83d877) connect$pptp(r2, &(0x7f0000000200)={0x18, 0x2, {0x1, @remote}}, 0x1e) 19:04:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0xffffffffffffff3c) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:46 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x53) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000080)={0xa30000, 0x7, 0x96, [], &(0x7f0000000040)={0x990b7d, 0x14, [], @ptr=0x1}}) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000000)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 1012.464092] QAT: Stopping all acceleration devices. [ 1012.484115] QAT: Stopping all acceleration devices. 19:04:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0x179, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0xffffffffffffff94}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0xffffffffffffffff) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x7f, 0x0) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f00000000c0)={0x9, 0xfffffffffffffff9, 0x98, 0x5, 0x4b71, 0xec8}) 19:04:46 executing program 3: r0 = add_key(&(0x7f0000000100)='ceph\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)="c2037955cc45ddfba9d6d9991155ca6a52525b6993870311111a91e5443b6695c287da3a662a160af8a21fdabd17984cd3ff0ea73d0ce568f0920cedcfd353e95f08f2ee83b8fdb2ee8e24e916f0bc7a641bc19deb37b44af8", 0x59, 0xfffffffffffffffe) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x400, 0x0) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000380)={0x7, 0x3, 0xfffffffffffffff9}) socket$xdp(0x2c, 0x3, 0x0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000280)="5e8af30201c0e604c8839e5f9951d0a3be8f17fecd38de9ed97734afe1353001119e9bcb99dcf04d0fa461a4281898038b09635f106140df4daba8d1a20e0fd96179ecffee0a895cb43e14fc4869515fac1fdd46ab8e851c229d5f21543ee1b88ddb67f77bacde36ea919eb080b569cb7721bf5881452ac430cfa7fcc9c3aed4134bff9166247d0712435cfbd2fe8e5198b1ec392521fb2b15b47153effcca781983430338228e5205cde42286d3a4077163cff8ea156deb2155b22e2560e2068b43066f7d1bd4e52d829bc4adf0", 0xce, r0) keyctl$assume_authority(0x10, r2) r3 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r3, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r3, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xc0fe, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:46 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x8040, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) write$selinux_attr(r0, &(0x7f0000000000)='system_u:object_r:restorecond_var_run_t:s0\x00', 0x2b) socket$inet(0x2, 0x2, 0xf15) 19:04:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:46 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x802, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0xffffffffffffffe3, 0x8001, 0x71, 0x10001, 0xb42, 0x6}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r2 = accept$alg(r1, 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000001100)='/dev/audio#\x00', 0x80000001, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000001140)=0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000001280)={[], 0x20, 0x400, 0x401, 0x6, 0x0, r4}) write$binfmt_elf32(r2, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:46 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x3, 0x1) read(r0, &(0x7f00000001c0), 0xffffff60) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x6, 0x101000) r2 = getpgrp(0xffffffffffffffff) fcntl$lock(r1, 0x1f7007963762bbc6, &(0x7f0000000040)={0x1, 0x3, 0x1, 0x3cd, r2}) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f00000001c0)={0x3, 0x3, 0x7fff, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000100)=0x8}) [ 1012.712834] QAT: Stopping all acceleration devices. [ 1012.755063] QAT: Stopping all acceleration devices. 19:04:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001100)='/dev/vsock\x00', 0x2, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001300)='/proc/self/net/pfkey\x00', 0x101400, 0x0) getsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000001140)={@dev, @rand_addr}, &(0x7f0000001180)=0x8) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r3, &(0x7f0000001100)=ANY=[], 0xff99) signalfd(r2, &(0x7f0000001340)={0x10001}, 0x8) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f00000000c0)={0x6, 0x401, 0x7}) recvmsg(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000001280)) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f00000012c0)={0x8, 0x7, 0x7cb, 0x102}) 19:04:47 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={r1}, 0x8) 19:04:47 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f00000000c0)={0x2, 0xe8, 0x8000002, 0x202}) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) 19:04:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x2, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:47 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000000)={0x8, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000040)=0xfffffffffffffff9}) [ 1013.357091] QAT: Invalid ioctl 19:04:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xee, 0x800) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000001100)=[{0x2, 0x2d809f6}, {0xa}, {0x8}, {0x6, 0x5}, {0x8, 0x3}, {0x3, 0xeba7}, {0x3, 0x6}, {0x3, 0x75}, {0xb, 0x1ff}, {0xe, 0x80000001}], 0xa) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x6, 0x4, 0x20}}, 0x28) [ 1013.381551] QAT: Stopping all acceleration devices. [ 1013.398597] QAT: Invalid ioctl [ 1013.406250] QAT: Invalid ioctl [ 1013.412071] QAT: Stopping all acceleration devices. [ 1013.417550] QAT: Invalid ioctl 19:04:47 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x20000000000000) read(r0, &(0x7f0000000100), 0x249) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0x4, "5105bd4f"}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000280)={r2, 0x54, "cbf9bc2116380c6d996e0f2b26b8b9d1a7e2ab06925cc15b3ff3c390a483884d4787a7f1d651e2531697c6a57dda79a66418dd4d9326ccbbf56de64faa0be0343645c8d0fa9c150b1d4c3f3db3591dd7350448ea"}, &(0x7f0000000300)=0x5c) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f00000001c0)={{0x80000000, 0x80000001}, 'port0\x00', 0x1, 0x8, 0x7ff800000, 0x7, 0x4, 0x4, 0x0, 0x0, 0x3, 0x7ff}) fcntl$setstatus(r0, 0x4, 0x400) 19:04:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x4000000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:47 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000000)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x101000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000002c0)={@loopback, @dev={0xfe, 0x80, [], 0x1f}, @ipv4={[], [], @multicast2}, 0xfffffffffffffc01, 0x7, 0xf2, 0x500, 0x81, 0x400080, r1}) write$P9_RREADDIR(r0, &(0x7f0000000080)={0x2a, 0x29, 0x1, {0x1, [{{0x4, 0x1, 0x8}, 0xfffffffffffff10d, 0x9, 0x7, './file0'}]}}, 0x2a) 19:04:47 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @empty, [0xfe, 0x60000000]}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x8000000000}) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000080)=""/156) 19:04:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc8a0700]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) 19:04:47 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xfffffffffffffffa, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000040)={0x1, {0x0, 0x4b3, 0x1000, 0x3}}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/4096, 0x1000, 0x10000, &(0x7f0000000080)={0xa, 0x4e23, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xc}}, 0x7}, 0x1c) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 1013.643522] QAT: Stopping all acceleration devices. [ 1013.682006] QAT: Invalid ioctl 19:04:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000001280)=""/164, 0xa4}, {&(0x7f0000001340)=""/139, 0x8b}, {&(0x7f0000001480)=""/80, 0x50}, {&(0x7f0000001500)=""/215, 0xd7}, {&(0x7f0000001600)=""/219, 0xdb}, {&(0x7f0000001180)}, {&(0x7f0000001700)=""/2, 0x2}, {&(0x7f0000001740)=""/143, 0x8f}], 0x8, &(0x7f0000001880)=""/4096, 0x1000, 0x8}, 0x7ff}, {{&(0x7f0000002880)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000002b00)=[{&(0x7f0000002900)=""/89, 0x59}, {&(0x7f0000002980)=""/28, 0x1c}, {&(0x7f00000029c0)=""/100, 0x64}, {&(0x7f0000002a40)=""/57, 0x39}, {&(0x7f0000002a80)=""/77, 0x4d}], 0x5, &(0x7f0000002b80)=""/124, 0x7c, 0xfffffffffffffffd}, 0x4}, {{&(0x7f0000002c00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000002f40)=[{&(0x7f0000002c80)=""/102, 0x66}, {&(0x7f0000002d00)=""/64, 0x40}, {&(0x7f0000002d40)=""/177, 0xb1}, {&(0x7f0000002e00)=""/53, 0x35}, {&(0x7f0000002e40)=""/238, 0xee}], 0x5, &(0x7f0000002fc0)=""/157, 0x9d, 0x1}, 0x800}, {{&(0x7f0000003080)=@can, 0x80, &(0x7f0000004140)=[{&(0x7f0000003100)=""/4096, 0x1000}, {&(0x7f0000004100)=""/13, 0xd}], 0x2, 0x0, 0x0, 0x8}, 0x40}, {{&(0x7f0000004180)=@nfc, 0x80, &(0x7f0000004340)=[{&(0x7f0000004200)=""/1, 0x1}, {&(0x7f0000004240)=""/163, 0xa3}, {&(0x7f0000004300)=""/38, 0x26}], 0x3, 0x0, 0x0, 0x20}, 0x6}, {{&(0x7f0000004380)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000004600)=[{&(0x7f0000004400)=""/21, 0x15}, {&(0x7f0000004440)=""/148, 0x94}, {&(0x7f0000004500)=""/248, 0xf8}], 0x3, 0xffffffffffffffff}, 0x10001}, {{0x0, 0x0, &(0x7f0000007b40)=[{&(0x7f0000004640)=""/4096, 0x1000}, {&(0x7f0000005640)=""/172, 0xac}, {&(0x7f0000005700)=""/250, 0xfa}, {&(0x7f0000005800)=""/221, 0xdd}, {&(0x7f0000005900)=""/4096, 0x1000}, {&(0x7f0000006900)=""/39, 0x27}, {&(0x7f0000006940)=""/197, 0xc5}, {&(0x7f0000006a40)=""/4096, 0x1000}, {&(0x7f0000007a40)=""/212, 0xd4}], 0x9, &(0x7f0000007c00)=""/156, 0x9c, 0x1}, 0x8}, {{0x0, 0x0, &(0x7f0000007d80)=[{&(0x7f0000007cc0)=""/146, 0x92}], 0x1, &(0x7f0000007dc0)=""/14, 0xe, 0x4}, 0x1ff}], 0x8, 0x40000022, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x7, 0x4, &(0x7f0000000080)=@raw=[@ldst={0x0, 0x2, 0x7, 0x7, 0x6, 0xfffffffffffffffe, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}], &(0x7f00000000c0)='GPL\x00', 0x6, 0x60, &(0x7f0000001100)=""/96, 0x41100, 0x1, [], r2, 0xc}, 0x48) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:48 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) accept4$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14, 0x800) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x5, 0x8, 0xffffffffffffc046, 0x5, 0x7fff, 0x8000, 0x7, 0x1, 0x3, 0xc2, 0xffffffffffffff69}, 0xb) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000180)={@loopback, @local, r1}, 0xc) [ 1013.703773] QAT: Stopping all acceleration devices. [ 1013.719097] QAT: Invalid ioctl 19:04:48 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001200)='/dev/dsp\x00', 0x400, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000001480)=""/4096, &(0x7f0000001300)=0x1000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001280)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x155) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r2 = accept$alg(r1, 0x0, 0x0) r3 = accept(r2, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001100)=0x80) getsockname$unix(r3, &(0x7f0000001140), &(0x7f00000011c0)=0x6e) write$binfmt_elf32(r2, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:48 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 19:04:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1013.787680] QAT: Stopping all acceleration devices. [ 1013.796162] QAT: Stopping all acceleration devices. 19:04:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'hash\x00', 0x0, 0x0, 'md5\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="97b7f2288a931da590b032", 0xb) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001280)='/dev/hwrng\x00', 0x400000, 0x0) connect$vsock_dgram(r1, &(0x7f00000012c0)={0x28, 0x0, 0x2711, @hyper}, 0x10) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000001100)=0xb) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r3, &(0x7f0000001100)=ANY=[], 0xff99) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001140)='/dev/ptmx\x00', 0x40, 0x0) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000001180)={0x5a9, 0x2, 0x9af, 0x8000, 0xfffffffffffffd41, 0x9, 0x8, 0x4000000000003, 0x1, 0x7f}) recvmsg(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 1013.896889] QAT: Stopping all acceleration devices. [ 1013.907367] QAT: Invalid ioctl [ 1013.916225] QAT: Stopping all acceleration devices. [ 1013.930385] QAT: Invalid ioctl 19:04:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xf401, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:48 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101100, 0x0) bind$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x2711, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100)=0x4, 0x8) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000001180)={0xa, 0x0, 0x0, @remote}, &(0x7f0000001280)=0x1c, 0x800) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000012c0)) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)=0x0) r4 = getpgid(0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000001100)='/dev/zero\x00', 0x40, 0x0) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r1, &(0x7f0000001140)={r5, r0, 0x8000}) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) setpriority(0x1, r6, 0x5a) 19:04:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:48 executing program 5: prctl$seccomp(0x16, 0x4, &(0x7f0000000040)) [ 1014.515041] QAT: Stopping all acceleration devices. 19:04:48 executing program 3: r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000100)=0x1c, 0x80800) sendmsg(r0, &(0x7f0000000800)={&(0x7f0000000200)=@in={0x2, 0x4e24, @local}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000280)="85f2", 0x2}, {&(0x7f00000002c0)="c514195d8a1f82a2273ca7d54aaf80804a", 0x11}, {&(0x7f0000000300)="00b2e9bed19a7d62d5c800d2869356ec0961ef4dc481a25624b23e473a3c7933d321bb0e411197711045dc82313ba7", 0x2f}, {&(0x7f0000000340)="065ab6a6dffaefa62f6a36cafe7512d6ebe7cd004c9e523a3cb1f8144ad6a6ba53f4b67a830e245306b7cae85bbe50284d625aab2dc401d3540c119a20f21fce1813940d754d566cb8e7bdcd93545a7074db1d51fe4fd352e05cebff0992b01e9099e7530023aa633b245bdd1d499b72f4a1f627ad48845e24c1f1019e79ebbdbe7aeffa7c9582c3d7c30e5851571e937f730e", 0x93}, {&(0x7f0000000400)="c2a442e04452caa8abf50196e99f1578e3092dfcc35b3314c7d8d1020191fcdbfc3df30cf909539ca0c0bfc00f590a026a22dffbb20a10e4a98bac9c36cf270d1836b8e509286481a1d6d802fc2b259cac854677ef716b8c3b10f43bba9d99fdc178a6a669eacf2789ceea53d368ad9695abddffc9e4e413e764aca36f47132e52f4f835288600781567a2e4a3ee1685aabfd4abc0243b038f786135a0bc0cdfd08093fa7a5a8cdf479e6fd50a4c827ea655eaebd2b717fb6bc63331f1e2a19c19126226cd0d779f35", 0xc9}, {&(0x7f0000000500)="a3ee4c9b65df702d9b28b263af885495e2d27b358add7f388a6d48f58a03bb016869731b8680350c7f8c3861fa662ffcfa3f3df0aa47dfce5fce7d1dec555ddde88c497f31dee0e0296a17ec5a1dee585a78d94a9ed54de35a4fd36035c4eaff48dbfea69ed33ac559554a9706afcc62eae5c9e008f2531a0cb8f84983c4f091e91b125360a076f319a80d046f8f1f84ecf748b298e91dc4cfb3df56425beaa12a36df9770335ba4fb4004316b72b547dad5ed9f6872bca213", 0xb9}, {&(0x7f00000005c0)="326906d3df171c5dded2744236d0b5002afe25737f2151ec4daa925b3e171044647ec525b6421231920fc7ce36f38e600103acb1e6a1bd92c382d71b277a78568f7120e9d7d0dc9043497d98f0cb828a76207673baf08c9ed6a1906941e6fe591d037d0a1065e1a08891944a21e6", 0x6e}, {&(0x7f0000000640)="d76516ac952d74eeda8d47a6a07e58301379c40a708d945d632e9c9bf3", 0x1d}], 0x8, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0xe0, 0x40000}, 0x40000) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/autofs\x00', 0x6800, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000b80)={@generic={0x8, "76b536588add1548cb938830b488c3204a0854c8095e9cb71006681c8b28eea563dc2227db978dbe75db1c81fae7fab36ab9c9633727d1f93a9deab3d172453bf093792d3ba87e78ec8324b769c00177d7d938bc4b4de7eb25273d8b522956c4d1b578319a320cffacef8814111ccd707af6fd522efa062a2d0ac87fbd14"}, {&(0x7f0000000a80)=""/139, 0x8b}, &(0x7f0000000b40), 0x20}, 0xa0) read(r1, &(0x7f0000000c80), 0xffffffffffffffb9) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000700)='/dev/hwrng\x00', 0x341001, 0x0) sendmsg$nfc_llcp(r3, &(0x7f0000000a00)={&(0x7f0000000740)={0x27, 0x0, 0x2, 0x7, 0x4, 0x6b7, "d126789fc1e6f688ed19e75656e78f59f235ab00e6a83efae3b6a3e8b00805ddb172bd368689e43332550733a1c5fa439583417abfc8c00ff3a74d49dc01f9", 0x15}, 0x60, &(0x7f00000009c0)=[{&(0x7f00000007c0)="b4bcc3e1f0068b689ec04e0c97a5f05fda4ed8c0e8eac102330ec677e43e93111fc1d756a1f4edda76142b5b3e4d1d3b833c4ff024587bc72d9d08", 0x3b}], 0x1, 0x0, 0x0, 0x4040000}, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r4, 0x40045542, &(0x7f0000000840)=0x4) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x4002, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:48 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x2000000000000272}) r0 = socket$kcm(0x29, 0x7, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r2, 0x50, &(0x7f0000000080)}, 0x10) 19:04:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xff0f, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f00000000c0)=0x401, 0xffffffffffffff26) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001280)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYRESOCT=r0], @ANYBLOB="d17a370579ccd9aea0a31564bcab58c052c14c73bcdb39da363222fb29f0779e9e91accf5238c1914e29650b3454fd8c27075a3281a4ddbf3d547e9a1c1001ecb283a7a57af8768b4596d6c7f2ca70ed8fd2b9636d4b9c1824b8c1ca61d11b76230d509a781b5393939f6273c52af8ea6934d1e16e08bba160ed5572c3c837072245838d01c098be01ba99a4ceb1d983f2f6d82284dd452195800a5b399d63f374347b0000000051e7d460de8eb9967aef9ece407dc6ce7c6661bd4d5c86d2e7a28106f61e3ab4ef15aa1d01da382b65234c44ddb3", @ANYRES16=r1], 0xdf) r2 = getpgrp(0x0) prlimit64(r2, 0xf, &(0x7f0000001100)={0x15b}, &(0x7f0000001140)) recvmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x11b3f9ade8f991a4, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 19:04:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:48 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80004, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @empty, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 1014.737327] net_ratelimit: 10 callbacks suppressed [ 1014.737341] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1014.746511] QAT: Stopping all acceleration devices. 19:04:49 executing program 4: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) 19:04:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 1014.786849] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:49 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xe, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:49 executing program 4: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) 19:04:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="97b7f2288a931da590b032", 0x16d) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x8000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001340)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000001300)='skcipher\x00', 0xffffffffffffffff}, 0x30) ioctl$VIDIOC_SUBDEV_S_SELECTION(r3, 0xc040563e, &(0x7f00000013c0)={0x1, 0xffffffffffffffff, 0x101, 0x7, {0x2, 0x100000001, 0x400, 0x5}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001380)={r2, r3, 0x0, 0xe, &(0x7f0000001280)='ecb-cast5-avx\x00', r4}, 0x30) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x20) ioctl$KDGKBDIACR(r5, 0x4b4a, &(0x7f0000001100)=""/174) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1015.064239] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1015.104329] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1015.133233] kauditd_printk_skb: 23 callbacks suppressed [ 1015.133249] audit: type=1804 audit(1540926289.396:5141): pid=25321 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1744/file0" dev="sda1" ino=16594 res=1 [ 1015.184554] audit: type=1804 audit(1540926289.446:5142): pid=25327 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1744/file0" dev="sda1" ino=16594 res=1 19:04:49 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2, 0x4) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f0000000200)={{0x3, @name="43d656aabd07fce034e0d370129d38a80576c438d006bf20ca97699ede129360"}, "fd2d2d1475495a462b1a5e9c6c951aadfe254d32c58ab33c2ae73c0ca8bdc8e0", 0x1}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x2003, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x800, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000140)) 19:04:49 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000000), 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3b6}, 0x8) setsockopt$inet6_dccp_int(r2, 0x21, 0x10, &(0x7f0000000100)=0x100, 0x4) socketpair(0x1b, 0x0, 0x4, &(0x7f0000000080)) 19:04:49 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0xfffffffffffffffc, 0x0) dup(r0) 19:04:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) preadv(r0, &(0x7f00000018c0)=[{&(0x7f0000001480)=""/213, 0xd5}, {&(0x7f00000013c0)=""/64, 0x40}, {&(0x7f0000001580)=""/33, 0x21}, {&(0x7f00000015c0)=""/129, 0x81}, {&(0x7f0000001680)=""/247, 0xf7}, {&(0x7f0000001780)=""/132, 0x84}, {&(0x7f0000001840)=""/36, 0x24}, {&(0x7f0000001880)=""/37, 0x25}], 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000001340)='/dev/null\x00', 0x40800, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f0000001380)={0x2, 0x80000000, 0x4, 0x3, 0x0, 0x1}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000001100)={0x4, &(0x7f00000000c0)=[{}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f0000001300)={r3, 0x1, &(0x7f0000001140)=[0x1], &(0x7f0000001180)=[0x6, 0x101, 0x0, 0x1, 0xfffffffffffffff7, 0x0], 0x46, 0x4, 0x80, &(0x7f0000001280)=[0xffff, 0x4, 0xfffffffffffff459, 0x5], &(0x7f00000012c0)=[0x80000000, 0x40000, 0x3]}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r4 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r4, &(0x7f0000001100)=ANY=[], 0xff99) accept$alg(r1, 0x0, 0x0) recvmsg(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 1015.479006] audit: type=1326 audit(1540926289.736:5143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25283 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:04:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xe00000000000000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18020000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1015.572809] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1015.622640] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:49 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000380)={0x98, 0x7d, 0x1, {{0x0, 0x82, 0x100000000, 0x200, {0x20, 0x2, 0x3}, 0x2000000, 0x5, 0x65b, 0x4, 0x11, '/dev/qat_adf_ctl\x00', 0x2c, '%userposix_acl_access$}@wlan1^wlan1cgroup[.:', 0x1, '\x00', 0x11, '/dev/qat_adf_ctl\x00'}, 0x1, '\x00', r1, r2, r3}}, 0x98) 19:04:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 1015.663085] audit: type=1326 audit(1540926289.926:5144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25343 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1015.730685] audit: type=1804 audit(1540926289.926:5145): pid=25341 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1745/file0" dev="sda1" ino=17969 res=1 [ 1015.745897] QAT: Stopping all acceleration devices. 19:04:50 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)=0xfffffffffffffffd}) [ 1015.761184] audit: type=1804 audit(1540926290.016:5146): pid=25359 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1745/file0" dev="sda1" ino=17969 res=1 [ 1015.770106] QAT: Stopping all acceleration devices. 19:04:50 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x1, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigprocmask(0x0, &(0x7f0000039ff8)={0xfffffffffffffffa}, 0x0, 0x8) r2 = gettid() timer_create(0x8000000009, &(0x7f00000001c0)={0x0, 0x3e, 0x4, @tid=r2}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) read(r3, &(0x7f0000000080)=""/128, 0xae3f1a6) timer_delete(0x0) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000080)=""/128, &(0x7f0000000100)=0x80) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup3(r0, r4, 0x80000) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r5, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x6000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="18000000", @ANYRES16=r6, @ANYBLOB="000128bd7000fbdbdf250e120000048c54eff1f678cca391ca6e1c0c699ca858eb4c77142838cc899b33994008cbb68cdcb5b2e3df30b26eb08164b177598d1b8bdecb6a3199d2c35f5a4de5ff059817e8c3b61519f8c38c45dafab36c9f9e7374a843337c8952f612f20b660f074de32f666a8b9f351c8b31a9c46759fde34c017a2a88c58f2ce85e608dba12560df2e180d177e7a9c76dbbe210389090da3284a4a153a85f0e15c39d17e85f296cc1378a7057c04e9cd1ad82069a6fdd32"], 0x18}, 0x1, 0x0, 0x0, 0x4004040}, 0x800) 19:04:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = open(&(0x7f0000001340)='./file0\x00', 0x80000, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000001380)={'team0\x00', 0x0}) r6 = syz_open_dev$adsp(&(0x7f00000013c0)='/dev/adsp#\x00', 0x9, 0x200) bind$xdp(r4, &(0x7f0000001480)={0x2c, 0x1, r5, 0x22, r6}, 0x10) r7 = accept(r1, 0x0, &(0x7f0000000080)) getsockopt$bt_BT_SECURITY(r6, 0x112, 0x4, &(0x7f00000014c0), 0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000001100)={0x0, @in={{0x2, 0x4e20, @loopback}}, 0x4, 0x8000}, &(0x7f0000001280)=0x90) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r7, 0x84, 0x71, &(0x7f00000012c0)={r8, 0x7}, &(0x7f0000001300)=0x8) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r9, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r9, 0x8946, &(0x7f0000000140)={'veth1_to_bond\x00', &(0x7f00000000c0)=@ethtool_dump={0x19}}) close(r9) close(r3) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r10 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r10, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r10, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) socket$xdp(0x2c, 0x3, 0x0) [ 1015.925400] QAT: Stopping all acceleration devices. [ 1015.959370] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1015.988601] QAT: Stopping all acceleration devices. [ 1015.998695] audit: type=1804 audit(1540926290.256:5147): pid=25376 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1746/file0" dev="sda1" ino=17809 res=1 [ 1016.048705] audit: type=1804 audit(1540926290.306:5148): pid=25382 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1746/file0" dev="sda1" ino=17809 res=1 19:04:50 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000000)={0x10000, 0x2}) 19:04:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) r2 = add_key(&(0x7f0000000080)='\'\x00\x00\x00eg>cy\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000001480)="404a6fdf20e6c2cec693e514f173fb5f76545653717c7c2cb745245faa748051c69688f5c1ccbecd115cb55a1c9e9b6ef4227e5b38079cc9f3616b4267fb9c77a21f645043ff0bee73b53849f0f111782633510cd9045d0c2281e05d64d8e42b1e6e31b1b1ca08bc3bdbb275e709a743025427bf2ebcabce903be1d183a478d02679ec38e814adf5175c7ca87082edb0b94ba1eee1ab967c84972627aff4e5d5384139f030454d61b762128697ffdca46117ea14e9d921f5dbaedca55aad000000000000000000000000000000", 0xcd, 0xfffffffffffffffc) select(0x40, &(0x7f0000001700)={0x460, 0x9, 0x4, 0x5, 0x7, 0x45, 0x9, 0x2}, &(0x7f0000001740)={0x80000001, 0x9b94, 0x7f, 0x4, 0x96, 0x9, 0x5, 0x2b}, &(0x7f0000001780)={0xcf, 0x401, 0x10001, 0x9, 0xfffffffffffffff7, 0x23c2, 0x7, 0xb3c}, &(0x7f00000017c0)={0x0, 0x7530}) r3 = request_key(&(0x7f0000001880)='id_resolver\x00', &(0x7f00000018c0)={'syz', 0x0}, &(0x7f0000001900)='bdev[\\keyring@\x00', r2) r4 = add_key(&(0x7f0000001380)='dns_resolver\x00', &(0x7f00000013c0)={'syz', 0x0}, &(0x7f0000001580)="e813587488a7ed072f7f478e0011", 0xe, 0xfffffffffffffff8) keyctl$dh_compute(0x17, &(0x7f00000015c0)={r2, r3, r4}, &(0x7f0000001600)=""/222, 0xde, 0x0) open_by_handle_at(r1, &(0x7f0000001280)=ANY=[@ANYBLOB="d100000008000000d6eeb8a74bcc750446bba64697ddb432c087edc794023bd79747b69a2d86b5dec34d7d6816e923a7e0b568585e521cd81ec247d6edc8c6bacf2237264d8e7a24e3d158580e80d75a89656215a9c8bf7ae5aa04aa9af8ac2fe41c1753ee3d18ab0d19e2eac36e530ba6c75ba80cbef0da3eaed96482e108949048e59bf8cefdd2e5268bf0d40c56b7385a69e761e2f4f83182fafa239d0f4a8cbdb3d756e001520ccdaed00860b993867bf7f502797cd27488750c4d2fbfa597c358cf6c180e0c4ae2f0cb3dcb189f12"], 0x400800) 19:04:50 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x3f, 0xffffffffdfffff7f, 0x4, 0x6}]}) 19:04:50 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000100)={{0x2, 0x8000000000004e24, @broadcast, [0xfe, 0x60000000]}, {0xffffffffffffffff, @broadcast}, 0x1, {0x2, 0x22, @remote}}) r1 = dup(r0) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0x6, 0x3, 0xb83d, 0x800, r0}) 19:04:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x54000000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1016.446878] audit: type=1326 audit(1540926290.706:5149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25343 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1016.562693] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1016.571847] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1016.578115] QAT: Stopping all acceleration devices. 19:04:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) io_setup(0x355, &(0x7f0000000080)=0x0) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000, 0x40a00) r3 = syz_open_dev$adsp(&(0x7f0000001180)='/dev/adsp#\x00', 0x4, 0x28000) r4 = open(&(0x7f00000013c0)='./file0\x00', 0x400, 0x100) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001500)='/dev/autofs\x00', 0x200000, 0x0) r6 = syz_open_dev$audion(&(0x7f0000001640)='/dev/audio#\x00', 0x1f, 0x400) socketpair(0x8, 0xe, 0x1, &(0x7f0000003840)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r1, 0x7, &(0x7f00000038c0)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000001280)="e5ef82f7e6fa60799cf66c4cb3f3397bdc057a5b51da84b04fea7ec037fe0ea6158ed39176179ef6a41786d69df5e90e2b36b294844c89bbc8f1f81689bfbd045e5aee5fdf261c33d44ad6b99f17f5e10cb3c20c870c9ff8a4c487321428904038e0d7c2364176f34761f31010b9d3adb846bd00a5eb236d2ced27502689aebb2ca3ea2b2f47d1e5c37f0c6fe7b1ef54ff681f2dfd00323f844155052a42ce6fffed19287197e98017e0ee77d2f262833770f8adc2046b69416e6f5892e0526b1d6cc439f4b62299e61aad74c361e320172c005545138ac68bca8b45d7922527d4f4e346a25aaa1865fe01fde8", 0xed, 0x48000, 0x0, 0x1, r2}, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x7, 0x2000400000000000, r0, &(0x7f0000001140)="f46ebae8aecc8da8c10d3b86406b82f7a1c0ba1afc6d0cd128b390dbabea4702423436da1ddf8000", 0x28, 0x1ff, 0x0, 0x2, r3}, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f00000017c0)="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", 0x1000, 0x1, 0x0, 0x3, r4}, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x1, 0x6, r0, &(0x7f00000014c0)="a3950680aefc02ab069754a9b2ffa3c7fdb0ce8b72326ecae3d79ecd7cadfa3e6dc62bae4ae35ad5cfcf8c03dbbcfb10b6fce05c08f704", 0x37, 0x9, 0x0, 0x0, r5}, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0xffffffff, r0, &(0x7f0000001580)="ca51c84838f8ed06229f97fd594ebbdbab7af156218e29969e4e36f234f58e2c289ca6b19ace3e0fcbfeda5fa90dddea780ba23f99f45dec6bde78d7632527d68040f730b28817628ef0747aa9ea9d626b301b15083c0cca343e947926db4fd55c8e106f196fbb9c0d8df22b1e744fc5361deb66d62f91a70bfaa0f9f60535a8c1289e083845f48b5b86fdb354a7f7fcee2f71c2d653c4003206f181df4547b950382dbfc2e7107fdd8d25c435075a15adcee94de65e6e6065c9bb77ca65a3", 0xbf, 0x654, 0x0, 0x3, r6}, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0xf, 0x6, r0, &(0x7f00000027c0)="955cb002dee918ef768f366502ff48c6c9cd4f52b48054cd77f854544d139f075e8be38cce5a4a76b8ad9dafdc9fcb594332d8ea04f4e0aa57b39481a1fc474dd433756e003a4044fbf0c8046e4dec708cdaa849a102e9a4dac71a798b0e7b0e0d6422ad9032ed9935afad9fb479878234aa091cbb2c", 0x76, 0xc83a}, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x7, 0x6, r0, &(0x7f0000002840)="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", 0x1000, 0x6, 0x0, 0x2, r7}]) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r9 = accept$alg(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r8, 0x84, 0x77, &(0x7f0000003900)={0x0, 0x0, 0x6, [0xffffffffffffff76, 0x6, 0x101, 0x1, 0x99c, 0x4]}, &(0x7f0000003940)=0x14) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x73, &(0x7f0000003980)={r10, 0x4, 0x30, 0x10000}, &(0x7f00000039c0)=0x18) write$binfmt_elf32(r9, &(0x7f0000001100)=ANY=[], 0xff99) socketpair$inet6(0xa, 0x5, 0x4, &(0x7f0000001700)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r11, 0x84, 0x1e, &(0x7f0000001740), &(0x7f0000001780)=0x4) recvmsg(r9, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:50 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f00000001c0), 0xffffffffffffff5d) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 1016.609193] audit: type=1326 audit(1540926290.866:5150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25398 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1016.609515] QAT: Invalid ioctl [ 1016.671447] QAT: Stopping all acceleration devices. 19:04:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:51 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x800000000005c) 19:04:51 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80000, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14, 0x800) sendto$packet(r1, &(0x7f0000000040)="fbbd470dadf15fd7782fcd3de20683e732b7e540da523edd0eac0b4dae91962795dc600ebd5568545357e6fe8a9e61f08911bffb8553137e4f99beb1f7a77d35f29354a2a9ce0c2950b6feef288b60fea4d421e500b9605bea38", 0x5a, 0x40, &(0x7f0000000200)={0x11, 0xfe, r2, 0x1, 0xbc, 0x6, @dev={[], 0x1b}}, 0x14) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000000300)={0x80000000000003, 0x0, 0x3ff, [0x0, 0x0, 0x0, 0x1000000], &(0x7f00000002c0)}) [ 1016.787433] QAT: Stopping all acceleration devices. [ 1016.805233] QAT: Invalid ioctl 19:04:51 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000080)={[0xaa61, 0x10001, 0x0, 0x3, 0x2, 0x8, 0x80, 0x7fffffff, 0x1, 0x8001, 0x1, 0x5, 0x7, 0x72e, 0xffffffffffffffff, 0xb240], 0x11006, 0x100002}) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 1016.837175] QAT: Stopping all acceleration devices. [ 1016.853321] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1016.867689] QAT: Invalid ioctl 19:04:51 executing program 1: setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000001100)=@v2={0x2000000, [{0x9, 0x9}, {0x2eb}]}, 0x14, 0x3) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x245) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x2}, 0x0) 19:04:51 executing program 3: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x2) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000240)=0x3) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100), &(0x7f00000001c0)=0x14) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000040)={0x9, 0x2, 0x7, 0xffff, 'syz1\x00', 0x7fffffff}) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8448, 0x0) read(r1, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 1016.952256] QAT: Invalid ioctl [ 1016.959772] QAT: Stopping all acceleration devices. [ 1016.999005] QAT: Invalid ioctl [ 1017.009922] QAT: Stopping all acceleration devices. 19:04:51 executing program 5: r0 = socket(0x2, 0xb, 0xf00c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000080)=[@in6={0xa, 0x4e20, 0x982, @mcast1, 0x9}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e24, 0x2, @mcast2, 0xffffffffffffff66}, @in6={0xa, 0x4e23, 0x1, @remote, 0x1}, @in6={0xa, 0x4e20, 0xffff, @dev={0xfe, 0x80, [], 0x20}, 0x5}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000140)={r1, 0x1d, "d840ef15289ce780551ec1ab864f6fd16c33f52f2ff43a47cda4de19f6"}, &(0x7f0000000180)=0x25) prctl$seccomp(0x16, 0x1, &(0x7f0000000040)) 19:04:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc8a070000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:51 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x20481, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000001100)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:51 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x408000, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) close(r0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000000080)={0x1, 0x2, @stop_pts=0x3ff}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)={0x0, 0xffffffff}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000140)={r1, @in={{0x2, 0x4e22}}, [0x1f, 0xe3c9, 0x13f, 0x4, 0x0, 0xffffffffffff0000, 0x100, 0x0, 0x9, 0x7798, 0x80000001, 0x0, 0x75f, 0xdf, 0x9]}, &(0x7f0000000240)=0x100) 19:04:51 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xb8ff, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:51 executing program 4: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) setns(r0, 0x20000) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {r2, 0xafa8}}, 0x10) 19:04:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x3) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000001100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000001280)={0x8, 0x120, 0xfa00, {0x3, {0x6, 0x7fffffff, "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", 0x94, 0x9, 0x2, 0x0, 0x3, 0x1ff, 0x4, 0x1}, r3}}, 0x128) 19:04:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x300, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1017.572567] QAT: Stopping all acceleration devices. [ 1017.588119] QAT: Stopping all acceleration devices. 19:04:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:51 executing program 4: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, 'nr0\x00'}) 19:04:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000001180), 0x4) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000001100)='/dev/vcs#\x00', 0x3, 0x80000) read$FUSE(r2, &(0x7f0000001480), 0x1000) ioctl$int_out(r0, 0x5460, &(0x7f0000001140)) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x9, 0x84000) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) 19:04:52 executing program 5: socket$packet(0x11, 0x3, 0x300) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0xffffffff) 19:04:52 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) ioctl(r0, 0x80000000, &(0x7f0000000000)="ed9a7fd0b3978ce664ff5a7b28dac3265691cab918e7c151d56b62ad280f62e8c56d8c295e434d2e8a6d32f275087527edf3dfd82a2d70915713dcdcf152c3d39b536b4019ecb9f62d72e9c2cd249a2da8fd21b064a399c7c87abcc13134cc17e5eb84b8") r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x10000, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000240)="33d35869294cb83edcbc0f19c5eeca90f671317b04bd8864390bed634bbe64425ef7acd62a8f02e6ced718b9a9c19c0d345fcb98885a3be4f16c064fdacf9bd4bca70fd3e00e5f778f98a4ef57a759752e831dfa71c9b52dd0fd1e62c27be244d9d1b437c141", 0x66) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x4500000000000000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:52 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x12) 19:04:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0x10062) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1018.354281] QAT: Stopping all acceleration devices. 19:04:52 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2000, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) wait4(r2, &(0x7f0000000100), 0xa1000000, 0x0) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) [ 1018.381826] QAT: Invalid ioctl [ 1018.386738] QAT: Stopping all acceleration devices. [ 1018.395528] QAT: Invalid ioctl 19:04:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x79) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001240), 0x0, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 19:04:52 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='stack\x00') ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000080)={'veth0_to_bridge\x00', 0x4}) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:52 executing program 5: syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7f, 0x80) prctl$seccomp(0x16, 0x1, &(0x7f0000000040)) 19:04:52 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000080)={0x7ffffffc, 0x80000000000, 0x3, [0x0, 0x0, 0x0, 0x1000000]}) 19:04:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/netstat\x00') ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f0000001100)) [ 1018.613476] QAT: Stopping all acceleration devices. [ 1018.658411] QAT: Stopping all acceleration devices. 19:04:52 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="00fb0703c9010000220000ffffffffffff00000000989a5ec9b253af6b9e008d28aaace2f10281eebc095704f595a79cd4c20dc7c241e2cb84a67eed1a382a5630194055d72712b0da7e18e7b0ee4d4244fa8d781f5bd164bd7f501d0636a64a0c1346921ce0ff84914c94bcfe0af36293a73c011b81e66a32e16852935b4ab479f35ee6c7d806b28d845043f2cee554b635936e07de32548f3e6dd591dba4d3830184eedaa316f213ad5bf52a201a5a081727a3e2aa946c39c6f5dd890636fddc39cd1d45d494a91000eb87bf1d3a62bb8f1d0f230c4d86fee4d004b4b00d4e553bf8881438353c9a08c3375ca5ee87346a90bf"], 0xfe, 0x3) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 1018.808459] QAT: Stopping all acceleration devices. 19:04:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xc4ffffff00000000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:53 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1000844a, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x20, 0x220280) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) 19:04:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT=0x0, @ANYPTR64=&(0x7f0000001100)=ANY=[@ANYRES32=r1, @ANYRESHEX=r0], @ANYBLOB="18bf64a26faf00530c2e84a8d688ecb00fd78fbf13"], 0x34) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:53 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x10, r0, 0x58) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {}, 0x0, {0x2, 0x0, @loopback}}) [ 1019.213569] QAT: Stopping all acceleration devices. [ 1019.234190] QAT: Stopping all acceleration devices. 19:04:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000001480)="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") r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x3, 0x28800) recvfrom$llc(r2, &(0x7f0000001100)=""/144, 0x90, 0x40000003, &(0x7f00000000c0)={0x1a, 0x31f, 0x3d6400000000000, 0x4, 0x0, 0x7fff, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000001280)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000012c0)=0x2c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000001300)={r3, @in6={{0xa, 0x4e23, 0x3051, @loopback, 0x8}}, 0x0, 0x10001, 0x6, 0x4}, &(0x7f00000013c0)=0x98) 19:04:53 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000180)={{0x2, 0x8000000800, @remote, [0xfe, 0x60000000]}, {0x8, @local}, 0x4, {0x2, 0x4e21, @loopback}, "00000000800000efffffffffffffff00"}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x4e1d, @multicast1}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x0, {0x2, 0x4e22, @multicast1}, 'team_slave_0\x00'}) 19:04:53 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x800, 0x2000) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000040)={0x0, 'yam0\x00'}, 0x18) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x81a, 0x101000) recvmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000080)=@can, 0x80, &(0x7f0000000340)=[{&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/147, 0x93}, {&(0x7f00000002c0)=""/120, 0x78}], 0x3, &(0x7f0000000380)=""/3, 0x3, 0x8}, 0x40000020) 19:04:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:53 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x44000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000040)=0x9) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 1019.461055] QAT: Stopping all acceleration devices. [ 1019.477845] QAT: Invalid ioctl [ 1019.483100] QAT: Stopping all acceleration devices. [ 1019.488358] QAT: Invalid ioctl 19:04:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x700000000000000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:54 executing program 4: socket$rds(0x15, 0x5, 0x0) r0 = socket(0x4, 0xa, 0xffffffffffffff44) r1 = dup(r0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000080)=0xb) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="f26678b48a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:54 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x6b}) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x80042, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)=0x0) write$binfmt_misc(r0, &(0x7f0000000180)={'syz0', "f721ae0211a0d46654d6540a829c8a0ac26d245c19e579e8bdeb02743e5a6780df5f3985f2056554648bfac8825edf5ce63ad7da6a2c35f3ce60868a81b1f08bc2b6ea26515e7be66a3375eabf56ab5e11fb5d8c441201696103c15abcb7674bd6f964fd60737716f150acd1019b17c4b643f8492dc81bb13f215177a7218af19450a751d1477d5d91809f5dcc2c4a614754a154812aea2cc4289f18a4d28a1c9e6d1fb5801a6aceb5a972679d2869b0850c74bf3393"}, 0xba) ptrace$peek(0x2, r1, &(0x7f0000000080)) 19:04:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:54 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0xff, 0x8000000000000100) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x408001, 0x0) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000240)) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x7fff, 0x4) [ 1020.165816] kauditd_printk_skb: 20 callbacks suppressed [ 1020.165831] audit: type=1326 audit(1540926294.426:5171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25629 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1020.197216] net_ratelimit: 10 callbacks suppressed [ 1020.197229] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 1020.216126] QAT: Invalid ioctl [ 1020.224445] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1020.241627] QAT: Stopping all acceleration devices. [ 1020.256188] QAT: Stopping all acceleration devices. 19:04:54 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x121000, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000000)={0x1, 0x8, 0xc3, 0x800}) ioctl$sock_inet_SIOCSARP(r1, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x306, @local}, 0x0, {0x2, 0x4e20, @local}}) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)=0x0) wait4(r2, 0x0, 0x8, &(0x7f00000000c0)) [ 1020.278600] audit: type=1804 audit(1540926294.496:5172): pid=25633 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1755/file0" dev="sda1" ino=16539 res=1 19:04:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:54 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) accept4$llc(r0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x800) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) sched_rr_get_interval(r2, &(0x7f00000000c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000001100)='/dev/vhci\x00', 0x40000, 0x0) connect$l2tp(r3, &(0x7f0000001140)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @rand_addr=0x5}, 0x1, 0x1, 0x4}}, 0x26) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 1020.375363] audit: type=1804 audit(1540926294.556:5173): pid=25649 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1755/file0" dev="sda1" ino=16539 res=1 [ 1020.431114] QAT: Invalid ioctl [ 1020.441825] QAT: Stopping all acceleration devices. [ 1020.459495] QAT: Invalid ioctl [ 1020.462833] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[], 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 1020.480665] QAT: Invalid ioctl [ 1020.487959] QAT: Stopping all acceleration devices. [ 1020.504959] QAT: Invalid ioctl [ 1020.508522] QAT: Invalid ioctl [ 1020.512186] audit: type=1804 audit(1540926294.766:5174): pid=25663 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1756/file0" dev="sda1" ino=18113 res=1 [ 1020.532096] QAT: Invalid ioctl [ 1020.560430] audit: type=1804 audit(1540926294.816:5175): pid=25673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1756/file0" dev="sda1" ino=18113 res=1 [ 1020.959068] audit: type=1326 audit(1540926295.216:5176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25629 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1021.006076] QAT: Invalid ioctl 19:04:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x40000000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:55 executing program 3: listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/40, 0x28) r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:55 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc7f000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) accept$packet(r1, 0x0, &(0x7f00000000c0)) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000001280)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)=@getaddr={0x14, 0x16, 0x101, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}}, 0x4800) write$binfmt_elf32(r2, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:55 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/ipc\x00') r0 = socket$unix(0x1, 0x2, 0x0) tee(r0, r0, 0x36, 0x2) socket$unix(0x1, 0x2, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x20040, 0x0) 19:04:55 executing program 4: pipe2(&(0x7f0000001dc0)={0xffffffffffffffff}, 0x4000) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="d30000006d6f3e62b1e476aeac37e2dfdb4df9ce0b377ff90e4c3f9b40eb8ae7d0d7ecd76b246a0dfcc82806df8e26294ab957b8bf1b0e4e2a3667a7f7265d8e2308955f49fce29bc75e8f030696f8a13aad1c2708e2b3b26f876e56ca257e5689fb70dd89cfaa29d7a69019ed4ba8fb4c24b0a396ba878ba1efb6554338a1ab8581be9f903111aa75950c6a7a21960a20a00dfc5580beaa55a6fc7f3903a391a66a9b0fca937ad491de0dd690d9fcb4c2c33045891b012c96a73f458f75d9f414797998799713626efff34cc67b333f0091bd9b49541142cd8845a7dc42a7bba8d9eafb373418"], &(0x7f0000001f00)=0xdb) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000001f40)={r1, 0x0, 0xffffffffffff1bdb, 0x6, 0x100000001, 0x101}, 0x14) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x203, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x8, 0xbb, 0x0, 0x2, 0x3, 0xfffffffffffffff8, 0x37a, 0x38, 0x21c, 0x4, 0x9, 0x20, 0x1, 0xd20, 0x7, 0x3}, [{0x3, 0x8000, 0x3, 0x2, 0x400, 0x8001, 0x100000001, 0x6}], "f9d0f3a30835f4f0e37a13dd99a79d44982a0ceeaaf2c0e2812c8ebbf9fd43268b85dfa3128bb31154fedbb9503e1bf97ee93c137da3db0293b292ea255df2e2d916", [[], [], [], [], [], [], [], []]}, 0x89a) [ 1021.131794] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1021.142551] QAT: Stopping all acceleration devices. [ 1021.144056] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1021.148280] audit: type=1326 audit(1540926295.406:5177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25683 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:04:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x20) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:55 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) r1 = semget(0x3, 0x0, 0xa0) semctl$SETVAL(r1, 0x2, 0x10, &(0x7f0000000000)=0x2) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) r2 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x4, 0x0) recvmsg(r2, &(0x7f0000001a00)={&(0x7f0000000500)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000580)=""/236, 0xec}, {&(0x7f0000000680)=""/36, 0x24}, {&(0x7f00000006c0)=""/13, 0xd}, {&(0x7f0000000700)=""/212, 0xd4}, {&(0x7f0000000800)=""/73, 0x49}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/115, 0x73}, {&(0x7f0000001900)=""/85, 0x55}], 0x8, 0x0, 0x0, 0x75cd}, 0x10000) connect$can_bcm(r0, &(0x7f0000001a40)={0x1d, r3}, 0x10) write$binfmt_misc(r2, &(0x7f0000001a80)=ANY=[@ANYBLOB="73797a31ccd131f430c29521f417cd39cd4dc7b2f858cb0d90d542d951116fe88a9f2073d57150d7bc9061d1826db3970b84cdbe4911d54bc0bf0f1ac3bcb4926ba86cd04c34d1ae41bf32f04b4dd24573180f9dd041d8a372991c712bf66d48501242dc7c26c3ccecf63ae8bc8d4668dd10072f901334394a71608dbf0cea2702b9eebaa32b152d8b3b780056307101df0a367fc00fbd99ed5861d65bb82e3e025658ff2481fd0650e6e29d8351e31ce84dcf40c9b8382e39173e3ce095dc4350b097d35c62feb66c363f0bb73f6e86571875623698d7f504141961d476df1e4033cb8ea28868e39b08e4c5eb81b2f9c330b6bb564ef7eba6fafd08bf18d47b8ef8ae271cb24c3264c26184749f5c7f27000000000000000000000000"], 0xf4) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000340)=0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000380)={0x0, 0xfff}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000400)={r5, @in6={{0xa, 0x4e24, 0x1f, @mcast1}}}, &(0x7f00000004c0)=0x84) getpriority(0x3, r4) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000100)) accept4(r2, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, &(0x7f0000000080)=0x80, 0x80800) 19:04:55 executing program 4: r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000080)=0x10, 0x80000) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={r1, r2, r3}, 0xc) r4 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x10000, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r4, 0xae78, &(0x7f0000000280)=0x2) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r5, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 1021.241011] QAT: Stopping all acceleration devices. [ 1021.249039] QAT: Stopping all acceleration devices. 19:04:55 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x10001, 0x0) signalfd(r0, &(0x7f0000000000)={0x7}, 0x8) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x208000) ioctl$TIOCEXCL(r1, 0x540c) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 1021.359228] QAT: Stopping all acceleration devices. [ 1021.369809] QAT: Stopping all acceleration devices. 19:04:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001100)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000001140)={0x0, @remote, @multicast1}, &(0x7f0000001180)=0xc) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d6}], 0x1, &(0x7f0000001400)=""/123, 0x7b, 0x5}, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x20080, 0x0) ioctl$DRM_IOCTL_GET_CAP(r3, 0xc010640c, &(0x7f0000000080)={0x6, 0x1}) [ 1021.881490] audit: type=1804 audit(1540926296.146:5178): pid=25688 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1757/file0" dev="sda1" ino=17301 res=1 [ 1021.932459] audit: type=1326 audit(1540926296.196:5179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25683 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1021.956377] audit: type=1804 audit(1540926296.216:5180): pid=25727 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1757/file0" dev="sda1" ino=17301 res=1 19:04:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x1802, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:56 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x400000) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000140)) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000080)={0x492, 0x8, 0x8, 0xfffffffffffffffa, 0x4}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f00000000c0)=""/108) syz_emit_ethernet(0x2e, &(0x7f0000000180)={@remote, @link_local, [{[], {0x8100, 0xffff, 0x4}}], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @multicast2, @broadcast, @multicast1}}}}, &(0x7f00000001c0)={0x0, 0x2, [0x628, 0x695, 0xe7e, 0x10c]}) 19:04:56 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) write$binfmt_elf64(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x10000, 0x1, 0x2, 0x7fffffff, 0x2, 0x3e, 0xb5dc, 0x23a, 0x40, 0x140, 0x3, 0x100000000, 0x38, 0x2, 0x7ff, 0xb3a, 0x9}, [{0x60000007, 0x7, 0x621, 0xb9c6, 0x3, 0x40446f85, 0x7, 0x5}], "35215eba7d3a570479991ae35868c45fece458eb26ccf7ce7940347cf77df5550ed79a95eb8304d2a9db0a53c2d25c41dc492ba18bc64201c82705cea783cbcd1022f4706c96c0c27f3d02d7ad163cc312042410ccf39b0a450a29b2d332260f635b68cad6e8674941c8f46c5b8a6829f1db8eba56ae5b3c4c80845ca23ec842bf13fe12291461b0cc20544a12ee8513d9f84761b6a9314627531495ab2cf5ecf8f6db37a15ac58c1f0bc1231c904e034beb32473610ddc9758a80bccb3d52f977a5d718f2c8bac7e8518e15b2510f2f572e4367225515b12d5aa009eef99ba0950366e99a1d2bf4e7bc4911ed326ccf1a8d17", [[], [], []]}, 0x46b) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffffff7, 0x80) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000100)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f00000001c0)) 19:04:56 executing program 1: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001380)='/dev/full\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000013c0)={0x0, 0xa0}, &(0x7f0000002480)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000001480)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], 0xbf) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r4 = accept$alg(r1, 0x0, 0x0) write$binfmt_elf32(r4, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) r5 = getpid() move_pages(r5, 0x0, &(0x7f0000001340), &(0x7f00000016c0)=[0x87b, 0x8, 0x5, 0x10000, 0x0, 0x100000000, 0x1, 0x5], &(0x7f0000001700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0) syz_mount_image$vfat(&(0x7f0000001100)='vfat\x00', &(0x7f0000001140)='./file0\x00', 0x2, 0x1, &(0x7f0000001280)=[{&(0x7f0000001180)="21f5", 0x2, 0xfffffffffffffff8}], 0x100c002, &(0x7f00000012c0)={[{@numtail='nonumtail=0'}, {@nonumtail='nnonumtail=1'}, {@uni_xlate='uni_xlate=1'}, {@shortname_mixed='shortname=mixed'}], [{@dont_hash='dont_hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'skcipher\x00'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) 19:04:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:56 executing program 5: [ 1022.078446] QAT: Stopping all acceleration devices. [ 1022.111208] QAT: Stopping all acceleration devices. [ 1022.118958] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:56 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x10001, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000000)={0xfffffffffffffffb, 0xf, 0x4, 0xe000, {}, {0x7, 0xf, 0x200, 0x3, 0x4, 0x5, "99cda5fc"}, 0x81, 0x1, @userptr=0x9, 0x4}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x218440, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000180), &(0x7f00000001c0)=0x4) read(r0, &(0x7f0000000100), 0x249) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000200)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000100)={0x1, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000080)=0x110000001}) 19:04:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) epoll_create(0x76f) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:56 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x50, {0x2, 0x0, @rand_addr=0x7}}) 19:04:56 executing program 5: [ 1022.236387] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xfe800000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1022.377171] QAT: Stopping all acceleration devices. 19:04:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) rt_sigpending(&(0x7f0000000080), 0x8) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:56 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)) 19:04:56 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @local, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:56 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x240002, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e24, 0x5, @loopback, 0x9}}}, &(0x7f0000000040)=0x84) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000080)={r2, 0x1f}, 0x8) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 1022.493936] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1022.523225] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:04:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001140)=ANY=[], 0x1000001dc) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RSYMLINK(r2, &(0x7f00000000c0)={0x14, 0x11, 0x1, {0x2, 0x3, 0x8}}, 0x14) [ 1022.593932] QAT: Stopping all acceleration devices. 19:04:56 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x5, 0x0, 0x401, 0x6}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000240)={0x3, r1, 0x2, 0x9}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f00000002c0)={0x1e, r2, 0x10001, 0x26}) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@empty, @loopback}, &(0x7f00000000c0)=0xc) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000280)=0xfffffffffffffcbd) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000100)={0x3, 0xffffffff95f518e0, 0xc35c, 0x100000000, 0x4, 0xf68189}) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1908001}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@gettfilter={0x2c, 0x2e, 0x300, 0x70bd25, 0x25dfdbff, {0x0, r3, {0x0, 0x1}, {0xf, 0x7}, {0x7, 0x4}}, [{0x8, 0xb, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x24000801) 19:04:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:56 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000040), 0x4) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f00000001c0)=""/94, &(0x7f0000000080)=0x5e) [ 1022.730433] QAT: Stopping all acceleration devices. [ 1022.756819] QAT: Invalid ioctl [ 1022.762754] QAT: Invalid ioctl [ 1022.768293] QAT: Invalid ioctl [ 1022.773513] QAT: Invalid ioctl [ 1022.778670] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1022.781558] QAT: Stopping all acceleration devices. [ 1022.795162] QAT: Invalid ioctl 19:04:57 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x1, 0x80000001, 0x6, 0x7, 0x1, 0x5, 0x2, 0xfffffffffffffff8, 0x1, 0x6, 0x7, 0x8}) read(r0, &(0x7f0000000100), 0x249) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, 0x1000}, &(0x7f00000001c0)=0x10) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 19:04:57 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x400002, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 1022.810480] QAT: Invalid ioctl [ 1022.819530] QAT: Invalid ioctl [ 1022.823542] QAT: Invalid ioctl 19:04:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:57 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f0000000280)={0xc12, 0x8, 0x300f, 0xfffffffffffffffa, 0x1000, {0x10001, 0x10001}}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000002c0)=0xfffffffffffffff7, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x40000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000540)={'team0\x00', 0x0}) ioctl$VIDIOC_QUERY_DV_TIMINGS(r3, 0x80845663, &(0x7f0000000300)) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000580)={@loopback, r4}, 0x14) r5 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x8001, 0x8000) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000001c0)={@multicast2, @multicast2, 0x0}, &(0x7f0000000200)=0xc) bind$can_raw(r5, &(0x7f0000000240)={0x1d, r6}, 0x10) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:57 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000000)=0x1) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e21, @multicast1}, {0x6, @dev={[], 0x18}}, 0x4, {0x2, 0x4e21}, 'gre0\x00'}) [ 1023.321865] QAT: Invalid ioctl [ 1023.326315] QAT: Stopping all acceleration devices. [ 1023.332128] QAT: Invalid ioctl [ 1023.337821] QAT: Stopping all acceleration devices. [ 1023.344443] QAT: Invalid ioctl 19:04:57 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)) set_thread_area(&(0x7f0000000000)={0x7, 0xffffffffffffffff, 0xffffffffffffffff, 0x10001, 0x8, 0x5, 0x3, 0xd600000, 0x2, 0x100000001}) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x10) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) 19:04:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x500, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000001600)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000001640)=0x14) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000001100)=ANY=[], 0xff99) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000001680)={0x6, 0x100}) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000001380)=[&(0x7f00000000c0)='ecb-cast5-avx\x00', &(0x7f0000001100)='ecb-cast5-avx\x00', &(0x7f0000001140)='lo\x00', &(0x7f0000001180)='skcipher\x00', &(0x7f0000001280)='skcipher\x00', &(0x7f00000012c0)='skcipher\x00', &(0x7f0000001300)='skcipher\x00', &(0x7f0000001340)='skcipher\x00'], &(0x7f0000001580)=[&(0x7f00000013c0)='ecb-cast5-avx\x00', &(0x7f0000001480)='ecb-cast5-avx\x00', &(0x7f00000014c0)='ecb-cast5-avx\x00', &(0x7f0000001500)='skcipher\x00', &(0x7f0000001540)='ecb-cast5-avx\x00']) recvmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:57 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @rand_addr=0x8001, [0xfe, 0x60000000]}, {0x306, @local}, 0x0, {0x2, 0x0, @remote}}) 19:04:57 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x7fffffff, 0x0, 0x0, 0x5, 0x7d, 0x6, 0x2}, &(0x7f0000000040)=0x20) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xffffff91, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40020000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1023.592297] QAT: Stopping all acceleration devices. 19:04:57 executing program 4: r0 = dup(0xffffffffffffff9c) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000000)) getpeername(r0, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000180)=""/207) 19:04:57 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x2, 0x40000002, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x200) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000000c0), 0x4) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000001100)=ANY=[], 0xff99) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001180)={0x0}, &(0x7f0000001280)=0xc) ptrace(0x10, r3) recvmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000001140)={0x2, 0x6, 0x401, [], &(0x7f0000001100)}) [ 1023.762218] QAT: Stopping all acceleration devices. [ 1023.776248] QAT: Stopping all acceleration devices. 19:04:58 executing program 4: pause() r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 1023.945529] QAT: Stopping all acceleration devices. 19:04:58 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20040, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) r2 = getuid() ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000040)={0x3, 0x401, r1, 0x7f, r2, 0xfffffffffffffffa, 0x2, 0x4}) 19:04:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) r2 = socket$inet(0x2, 0x6, 0xd18f) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000001600)={0x0, 0xdba}, &(0x7f0000001640)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000001680)={r3, 0xe9e6}, 0x8) accept(r1, &(0x7f0000001280)=@in={0x2, 0x0, @multicast1}, &(0x7f0000001300)=0x80) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) r4 = msgget(0x3, 0x21) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001700)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) r6 = getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001480)={{{@in6, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f00000000c0)=0xe8) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = dup(r1) ioctl$KVM_SET_BOOT_CPU_ID(r9, 0xae78, &(0x7f0000001340)=0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001380)=0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000013c0)=0x0) msgctl$IPC_SET(r4, 0x1, &(0x7f0000001580)={{0x2, r5, r6, r7, r8, 0xcc, 0xffffffffffffff07}, 0x7, 0x1, 0x2ad1e339, 0x100000000, 0x8, 0x5, r10, r11}) r12 = msgget(0x1, 0x480) msgctl$MSG_STAT(r12, 0xb, &(0x7f0000000080)) 19:04:58 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RREADDIR(r1, &(0x7f00000010c0)=ANY=[@ANYBLOB="41010000290104000000000100000000000000000800010000000000000000000007002e2f66696c6530369a903781bc41c8ea910f8cd31b60888c87fe0e31243e4ecd953bed09e2b531a77137b99711e627ae080c7bcfe239adb77afa072215dafbe2139c5e15b1e6a7f8a4c6e2fa7236b4169720f00d6dc72899bcf952d50c53c10dc606e06f46eee0f7c0f03ac30000000000000019cb19485ee432e959486df8b6d4997761b7a52b51c155074e8dd7757a60c21ba992b89ea2c403"], 0x2a) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000600)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x80000, 0x0) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1, {0x0, {}, 0x0, r3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) sendmmsg$unix(r2, &(0x7f00000005c0)=[{&(0x7f0000000380)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000940)="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", 0x77d}], 0x1, 0x0, 0x0, 0x20000000}], 0x1, 0x800) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000007c0)={0x78, 0x0, 0x3, {0xff, 0x2, 0x0, {0x2, 0x69, 0x20, 0x8000, 0x80, 0x5, 0x3, 0x100000001, 0x7, 0x0, 0x6, r3, r4, 0x9, 0x7}}}, 0x78) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r7, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r6, r5}}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e20, 0x5, @ipv4={[], [], @multicast1}, 0x200}}, 0x1a3f, 0x0, 0x7, 0x3, 0x29}, &(0x7f00000000c0)=0x98) umount2(&(0x7f0000000780)='./file0\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000880)='/dev/vga_arbiter\x00', 0x200000, 0x0) r8 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r8, &(0x7f0000000880), 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r8, 0xc0285628, &(0x7f0000000040)={0x32, 0xffffffffffffff80, 0x40, [], &(0x7f0000000000)=0x7}) ioctl$VIDIOC_SUBDEV_S_EDID(r8, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:04:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc8a0700]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x10000, 0x0) connect$vsock_dgram(r1, &(0x7f00000000c0)={0x28, 0x0, 0x2710, @host}, 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) pwrite64(r2, &(0x7f0000001100)="8307c9b0b61c2358d29483c0c3fc2b7f92bea19026781482a257acde4a6432469a10f778ee0af45ba0a37155aeac673f0fed51c9408294783e00f1743f7468deb35ae0d2c5e0aca039b456ce138293523e6353d9f132f1d235b1f538fa7fc8c3075d716731ea6452ce62f7a92927a273fc18d253e770b86e3a2cfa39e2fa65480b8d1649b3114e4e72a1732f5b34e1298c39c0fde83daf324a1a98b9ce9fc5107c232124c89a1580c0", 0xa9, 0x0) 19:04:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x6000000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1024.519549] QAT: Invalid ioctl 19:04:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8010017d]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0xfffffffffffffd50) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:04:58 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x80800, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000240)) read(r0, &(0x7f0000000100), 0x5a3) remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000005, 0xffffffff7fffffff, 0x8000) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) fsetxattr$security_smack_transmute(r2, &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x1) write$P9_RSTATFS(r1, &(0x7f0000000280)={0x43, 0x9, 0x1, {0x9, 0x4, 0x8, 0xfffffffffffffffe, 0x6000000000, 0x7, 0xcd81, 0x1000, 0x7f}}, 0x43) ioctl$DRM_IOCTL_FREE_BUFS(r2, 0x4010641a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[0x2, 0x5]}) 19:04:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001280)='/dev/snapshot\x00', 0x40, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x10c6, 0x6, 0x80, 0x9b, @tick=0x2, {0x7ff, 0xca}, {0x40000000006, 0x8}, @time=@time={0x0, 0x989680}}], 0x30) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000001140)={"69666244af00", {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}}) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f00000000c0)=0xff, 0x4) [ 1024.746074] QAT: Stopping all acceleration devices. 19:04:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc7f]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:04:59 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000000)) [ 1024.871914] QAT: Stopping all acceleration devices. [ 1024.884869] QAT: Invalid ioctl [ 1024.889588] QAT: Invalid ioctl [ 1024.908615] QAT: Stopping all acceleration devices. [ 1025.256167] kauditd_printk_skb: 23 callbacks suppressed [ 1025.256181] audit: type=1326 audit(1540926299.516:5204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25893 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1025.303452] QAT: Invalid ioctl 19:04:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) fdatasync(r0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x201, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000001100)) 19:04:59 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) prctl$intptr(0x0, 0x10000) socket$can_raw(0x1d, 0x3, 0x1) pause() 19:04:59 executing program 4: rt_sigtimedwait(&(0x7f0000000080)={0x9}, &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, 0x8) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000000)={0xddcd, 0x34324142, 0x3, @discrete={0x101, 0x3}}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:04:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x103, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x38) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r4 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x7, 0x400) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000480)={r5, 0x3}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000f00)={{{@in6, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000002040)=0xe8) r7 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002080)={{{@in6, @in, 0x4e23, 0x7, 0x4e21, 0x81, 0xa, 0x80, 0x80, 0x8, r6, r7}, {0x7, 0xfffffffffffffff7, 0x429, 0x3, 0x7, 0x955c, 0x1, 0x7}, {0x7, 0xfffffffffffffff8, 0x1, 0x6}, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1}, {{@in6=@local, 0x4d4, 0x7f}, 0xa, @in6=@mcast2, 0x3507, 0x4, 0x3, 0x400, 0x8, 0x3, 0x3f5}}, 0xe8) setsockopt$inet_mreqn(r3, 0x0, 0xe368adb30c792f1f, &(0x7f0000000340)={@local, @local}, 0xc) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000100)=0x0) getpeername$unix(r3, &(0x7f00000003c0)=@abs, &(0x7f0000000600)=0x6e) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000280)=r8) openat$cgroup_procs(r3, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000580), &(0x7f00000005c0)=0xc) unshare(0x40000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000001000)={{0x3}}) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x100000000, 0x2000) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="025cc807") r9 = fcntl$getown(r0, 0x9) ptrace(0x421f, r9) clock_gettime(0x0, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000001c0)={0x8, 0x0, 0xc71a, {}, 0x100000001, 0x8}) prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x8, 0x7, 0x4}, {0xfffffffffffffffb, 0x8000000000001, 0x0, 0x7ff}, {0xfffffffffffff566, 0x1b, 0x7, 0x2000000000}, {0x8, 0xffff, 0x100, 0x8}, {0x59, 0x6, 0xffffffff, 0x400}, {0x3440076a, 0x4, 0x1, 0x5}, {0x4, 0xc3, 0x5c9, 0x9}]}) 19:04:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fdc]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1025.390909] net_ratelimit: 9 callbacks suppressed [ 1025.390923] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1025.403384] QAT: Stopping all acceleration devices. [ 1025.430523] audit: type=1804 audit(1540926299.686:5205): pid=25957 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1767/file0" dev="sda1" ino=17320 res=1 [ 1025.527747] IPVS: ftp: loaded support on port[0] = 21 [ 1025.554242] audit: type=1326 audit(1540926299.816:5206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25958 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1025.705416] QAT: Stopping all acceleration devices. 19:05:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x1000000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="8a0f", 0x2) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x101800, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r2, 0x810c5701, &(0x7f0000001280)) 19:05:00 executing program 4: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x149) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000180)=0x8, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000080)={{0x6, 0x1}, 'port1\x00', 0xa, 0x10, 0x6, 0x6, 0xffffffff7fffffff, 0x10000, 0xb2d, 0x0, 0x2, 0x100000001}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x80000, 0x0) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000200)={0x1, 0x0, [{0x0, 0x0, 0x2}]}) ioctl$sock_inet_SIOCSARP(r2, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 1025.945689] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:05:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xfffffffffffffdd9) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:05:00 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) finit_module(r0, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2) r1 = request_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0xfffffffffffffffc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r1, r2, r3) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000080)}) [ 1025.995579] QAT: Stopping all acceleration devices. [ 1026.012820] QAT: Stopping all acceleration devices. 19:05:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x400000) ioctl$VIDIOC_DBG_G_CHIP_INFO(r2, 0xc0c85666, &(0x7f0000001480)={{0x3, @addr=0x2}, "e506d56027db3e0afae22c012006d920d6e285061b40b445b239a48e70462d89", 0x3}) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffc69, &(0x7f0000001380)=[{&(0x7f0000002580)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001140)=""/123, 0x19d}, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x8, 0x101800) ioctl$KVM_GET_IRQCHIP(r3, 0xc208ae62, &(0x7f0000001280)) ioctl$FIBMAP(r1, 0x1, &(0x7f0000001100)=0x8) 19:05:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1026.182996] QAT: Stopping all acceleration devices. 19:05:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001240), 0x0, &(0x7f0000001400)=""/123, 0x7b}, 0x40010020) [ 1026.215716] QAT: Invalid ioctl [ 1026.218246] IPVS: ftp: loaded support on port[0] = 21 [ 1026.227270] QAT: Stopping all acceleration devices. 19:05:00 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000040)=0x88ff) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x200000) [ 1026.303842] audit: type=1326 audit(1540926300.566:5207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25958 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:05:00 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = request_key(&(0x7f0000000080)='.dead\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0xfffffffffffffffd) keyctl$revoke(0x3, r1) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:05:00 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x20, 0x46200) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000200)="c4ba99fb66716b78b4f30eebd23ae9bc566af18b84044870653ccb644d53d49ba051d3a8119b001cfe38a505707b608848af7ae047a6e4f82ac9a6ce97d766773ad76b4f01f8be9f8a68984016d5957d10974725bdd7a7b36c67467106e02976c871c70558d38fcd7a76f563dbb785035af56ffb62f1f3e889319f04eff9de23e2ff4abbc64e1bc08bab38b990784b6b494d9578c1a465b755bc86566a1f60e79830b2768f2578e9650a9a2661ce52164ae530dd03e2d9bbfb494e2ad4d57fe20cdd92c5a0b912cf9e97") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000080)=0xff75) getsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000100), &(0x7f0000000180)=0x4) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000000)={0x5}) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f00000000c0)={0x6, 0x8001, 0x1, 0x2, 0x5, 0x5}) socket$key(0xf, 0x3, 0x2) prctl$seccomp(0x16, 0x10001, &(0x7f0000000040)={0x267440e}) [ 1026.437850] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:05:00 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x800) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000040)={0x8, 0x10000, 0x9}) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 1026.494382] audit: type=1804 audit(1540926300.756:5208): pid=26004 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1768/file0" dev="sda1" ino=17323 res=1 [ 1026.527081] QAT: Stopping all acceleration devices. [ 1026.548085] QAT: Stopping all acceleration devices. [ 1026.570433] audit: type=1804 audit(1540926300.826:5209): pid=26013 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1768/file0" dev="sda1" ino=17323 res=1 19:05:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xa896444b, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001100)='/dev/vsock\x00', 0x101002, 0x0) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000001280)={0x5, 0x3, 0x1, "f690a52f52029a60c100a4aa5ca420928338410e5993257892ae582422c929bd", 0x3031334d}) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000001140)={0x7b, 0x0, [0x100000001, 0x1]}) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f00000012c0)={@ipv4={[], [], @dev}}, &(0x7f0000001300)=0x14) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r2 = accept$alg(r0, 0x0, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x5, 0x1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f00000000c0)={0x1, 0x4, 0x2}) write$binfmt_elf32(r2, &(0x7f0000001340)=ANY=[@ANYRES64=r3, @ANYRESHEX=r0, @ANYRESDEC=r3], 0xc) recvmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:05:00 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:05:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:00 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)) prctl$seccomp(0x16, 0x1, &(0x7f0000000080)={0x7, &(0x7f0000000000)=[{0x35c, 0x4, 0xffff, 0x4}, {0xee000000000000, 0xc6ea, 0x4, 0x3000000000}, {0x1000, 0x3f, 0x5cc7, 0x90b}, {0x0, 0x4, 0x5ab3, 0x7fffffff}, {0xff, 0x9bc, 0x4, 0x20}, {0x100000000, 0x7ff, 0x1}, {0x4, 0x4, 0xfffffffffffeffff, 0x4}]}) 19:05:00 executing program 4: r0 = socket(0x3, 0xe, 0x8001) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @aes256}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0xfffffffffffffff8, 0x0) [ 1026.757920] audit: type=1326 audit(1540926301.016:5210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26025 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1026.820881] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1026.823910] audit: type=1326 audit(1540926301.056:5211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26025 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:05:01 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x80000001, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:05:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-avx\x00'}, 0xffa6) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40002, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f00000000c0)=0xfffffffffffffffe) [ 1026.876170] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1026.925789] audit: type=1804 audit(1540926301.176:5212): pid=26035 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1769/file0" dev="sda1" ino=17288 res=1 19:05:01 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000000)={0x0, 0x2, {0x1, 0x100000001, 0x3, 0x401}}) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x20000, @broadcast}}) [ 1026.998392] audit: type=1804 audit(1540926301.256:5213): pid=26054 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1769/file0" dev="sda1" ino=17288 res=1 19:05:01 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffff9c, 0xc028ae92, &(0x7f00000002c0)={0x78f, 0x1000}) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000300)=ANY=[@ANYBLOB="010001000000000001000000000000000400000000000000", @ANYRES32=r0, @ANYBLOB="000000008100000000000000000000000000000000000000000000002da32d219df381eede9406e2de1a9ea07a9b4360bd42c587b01c3072d2928518f735c0332af5575eb531dee0a065dff5f4b4500a7710b5aa74a27730762f457b5fca92ec43", @ANYRES32=r0, @ANYBLOB="00000000060000000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="00000000ca9200000000000000000000000000000000000000000000"]) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) capset(&(0x7f0000000180)={0x20080522, r1}, &(0x7f0000000280)={0x9, 0x3, 0xfff, 0x2, 0x77c, 0x3}) read(r0, &(0x7f0000000100), 0x249) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000400)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000100)={0x3b0000000000, 0x2, 0x4000002d69, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x8200) getsockopt$bt_sco_SCO_OPTIONS(r3, 0x11, 0x1, &(0x7f0000000040), &(0x7f0000000080)) 19:05:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = creat(&(0x7f0000001100)='./file0\x00', 0x5a) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000001300)={0x0, @in6={{0xa, 0x4e23, 0x6, @mcast2, 0x7fffffff}}}, &(0x7f0000001140)=0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000001480)={r2, @in={{0x2, 0x4e22, @local}}}, 0x84) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r3, &(0x7f0000001280)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES32=r3, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRES64=r0], @ANYRES64, @ANYPTR, @ANYRESOCT=r3, @ANYRES16=r3, @ANYRESDEC=r3], 0xffffffa6) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) recvmsg(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:05:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1027.116052] QAT: Invalid ioctl [ 1027.130040] QAT: Stopping all acceleration devices. [ 1027.142542] QAT: Invalid ioctl [ 1027.166127] QAT: Stopping all acceleration devices. [ 1027.199356] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:05:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xffffff8d, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:01 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) connect(r0, &(0x7f0000000080)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x80) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:05:01 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001600)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000001640)=""/177) r1 = syz_open_dev$sndpcmp(&(0x7f0000001480)='/dev/snd/pcmC#D#p\x00', 0x80000000, 0x2000800) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f0000000000)={0x4000000000, "76d43be22322b8583a36902d908cb0d26ef7bc88b134cd471535a7b7befa6f40", 0x2, 0x1}) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r2, &(0x7f0000000100), 0x249) sendmmsg(r1, &(0x7f0000001800)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="21f14ab649aa148278965dbba59b6d8043a0749909d1af3c09969f6fd41ef57664faee34705e4bce2ce298e1d9b183681d38babf7eaa464caa5c4ea7ed6159534b7547aa3da785a286d27a5b085d9802df266d68c3939256caa15db18a12c3549fc8f2ce5ca7e62c6da613e19fe4c3d892a102ca6c2d1f129774c73d30e388b2d13959f7ac094014fed4c1ca73d2f7dc03f2e3d2f0110ea1d50169760c33d2e96d6160d8f6863b186cb391fb4ae4f67078c175602cfd57", 0xb7}, {&(0x7f0000000280)="324676019d4cf3d88bb0315a7b56a3ff9ebb88c27148c9c2591d70068d464268e5e2c92406485cfead033e36e5102d90de937afa3aa811a9853eca416ef469c4701dd4d87f17e7736993117e75986051d567c6def992d7c7d5f160372b7e7a7d8801cc7697b6fca40ce9b2b244dacd85ec50cda14f0caa824c408a4c1adb81a17cff1c93e3c36ffd01a357bcbae7e24007943e", 0x93}, {&(0x7f0000000340)="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", 0xff45}, {&(0x7f0000001340)="144998f35c5ca72a4fd0c486ab4ffd3921bac54349d8c7fa69eea45f2273e06250b02648ebb0cfe46387279ebdcfc5579f3c4aeeeeab830e38cec3d5291efe025a25c4c56b608b8ebfe0981df03872a9f5616920d7376b7902e8fcb031a1b15fa122827920f32c80cd50d24611ce414534f4560bdf8a34dfde41118e893264a3848f372e305e4fea0e627d2a9ef687329cbcb20b012e1a185ec68b69807501792505ad9659281837f5e994a16d877371443c4184df85008a76b6daae5048eaf9197457c852afb87ba4003a9adc72125c8cbede1abd03e3b8e1cbb2a8bcaad516b48d76f4333fd9bc10e232f393ca1b", 0xef}], 0x4, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], 0x494, 0x10}, 0x20}], 0x1, 0x40001) io_setup(0xfff, &(0x7f00000015c0)=0x0) io_destroy(r3) ioctl$VIDIOC_SUBDEV_S_EDID(r2, 0xc0285629, &(0x7f0000000180)={0x3, 0xffffffffffffffff, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000001440)={0x0, 0x3, 0x1ef10000000, 0x80000000, 0x2, 0x1}, &(0x7f00000014c0)=0x14) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000001500)={r4, 0x6f92c3c9}, &(0x7f0000001540)=0x8) syz_open_dev$video4linux(&(0x7f0000001580)='/dev/v4l-subdev#\x00', 0x100000000, 0x123000) 19:05:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:01 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x5, 0x2, 0x7fc, 0x4}, {0x7f, 0xcba, 0x0, 0x7}, {0x2, 0x8000, 0x2, 0x2}, {0x1, 0x0, 0x0, 0xd1a0}, {0xfffffffffffffff9, 0x6, 0x0, 0xfff}, {0xfffffffffffffffa, 0xce05, 0x185, 0x80000001}]}) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001880)='/dev/vsock\x00', 0x4000, 0x0) stat(&(0x7f0000001a40)='./file0\x00', &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() write$P9_RGETATTR(r0, &(0x7f0000001980)={0xa0, 0x19, 0x2, {0x2003, {0x20, 0x2, 0x1}, 0x20, r1, r2, 0x2, 0x92, 0x20, 0x6, 0x8, 0x2, 0x800, 0x7f, 0xb7aa, 0xc085, 0xffffffff, 0xad, 0x3, 0x101, 0xfffffffffffffffb}}, 0xa0) r3 = socket$inet(0x2, 0x80000, 0xfff) sendmmsg$inet_sctp(r3, &(0x7f0000001800)=[{&(0x7f0000000080)=@in={0x2, 0x4e21, @local}, 0x10, &(0x7f00000002c0)=[{&(0x7f00000000c0)="6d5403f9c0a6af41ce16f7325885327ff65e015fbcc29a43101215343f02faab054e8b292b16e6e5c3088ae0cfff3f2bd7a9b1efcaf841e59de6ffde39e7e29ad1c516c1b107db4fa6819e913378b5d5b41f696aeede12937cea9bcc804fec0d5788a283245d7fbfbf78d8e951cf98b6c313c0d27b155deabd61bece86ebd14ab0b810fe752c1a3684f1bee7ab9fff52efa4df8ec62a170c", 0x98}, {&(0x7f0000000180)="f21421e2f3fa2114363b15fa30bce783560d06d405183dab3e04e492c38355ba7fa3363708c011a0b25fb2adad4de7bf010a7c0f1f6f911b2321be8fece02efb1083829b5e012496f4086726da2cfabd43e94de4f0d5fbd9507e96f5b4e8536f4ae7bb1e867b93d8403660313c41e2bf404f101fd0f969c03b07e20741144ac9b10033e56cf4c54f8c3733b65b5eaa59fdd1c8cecf43beef2767ed8931fc4731bc0c5dff3696d001985a860d4de1a3fcf46f87d66253f9bb52e45d689835d94bb247e67809a81f82c49ad0adfde52ee765d3c818640032b70dd76c175d53d5841d90803fd0fd3a29c50575e10a00", 0xee}, {&(0x7f0000000280)="bf943892190103da0e608548ff7a84e5c9d84182bc3c9484fb55368746040b8e654131c4b1851ba80f2b3e9ba22efe7a8375c8ef074b2e5704ae8c1e", 0x3c}], 0x3, 0x0, 0x0, 0x4000}, {&(0x7f0000000300)=@in={0x2, 0x4e21, @local}, 0x10, &(0x7f00000016c0)=[{&(0x7f0000000340)="ed395712e16f30decf44caa3ac55cfe827847b1aca804fd67a503434147f5f26c4cd34a0d37f537412ab8889d222fcac57eb77ba8bc1769dcf668d43f99b5b530b9ef8f08b7334257430cd6167eb0e83651c823127292dd26d64e78bdb99bf87c94ffcfd1095c59eedae855e98b1c16fa30beff70e6f77f62dc0119803dfd81176d39d1f43b656f27bf8949f36af2c0ba4377a666e68aa7f3f873514be0ffa632667ce741eb38c5ce323be52da66deb6531dcfac1679ae29f3be475a7ef1ffbd7e24a12f0a5730c2b4e1", 0xca}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="3e820d4312ddfc9f2724846226dbf77c9f9e6678840703486873367f752e776fba960979d24e038c1f760599f36b8a7cdfcffdf277fb3598fd613c2c65544bf23fea4232bafd05accd0bbc3fcd4d5c4795f4ab8f6895e5497a51742443238911614fd54325f17e834a87aa68b9684bf37c30", 0x72}, {&(0x7f00000014c0)="351728e877153cfd30ea6f4974a150169da9bcf184019af93c8d54f3fce8bcf0020d119b6136b7bcb1a5e91267bd12bdd742306e13aca7c7dcf7f337f243544180e5dc7e6b511b87340b89fd29cda4cfb89d6f8452510a0b0743bf229833f3539e0747d4a7ef7b5d2d4d10fa3f9d1b109a0f226f4c0251d9c312353a8afaa3deb14e0cd213691d5e01facaeecd22752c3a51d1c2580ac0ec341bdf695f7bc4fea47f85fde80e699aebc35af8c42c0f9f0edf5ad497560a712759cdbb50c37d99cec9364c402752a6025184b5482e23a2db6701be0e35a36cb3f38986707779b11d837c18512b7ae91b258e82a020ef259bbb3f7572", 0xf5}, {&(0x7f00000015c0)="8e5957229796c335aa3d868e03b48487558a4bf9e602fcb1a65b5fcd348d62d31234881840d8b5839ef1815784d6e4f9937c3d7c2a8587f93aecc7218b59a290a3417fecde5ce702de04ddd63697295a17b85c63b27c56abbb4790cf0101532814b4165b5c8ed96fca0a51a11949c8a0803c342bdc1093fe", 0x78}, {&(0x7f0000001640)="05d2c54d108e0cc332ffb61e4e6d3a558cca39af8b25f4bc9f0e464b305b2c45e8af70cf02c67ae0a0925a8f1cc18dd9eec5fd1012b4d27f153649db380c50eb60bac7687c0bed4ea89410316c71f0ce6ef156ae714d", 0x56}], 0x6, &(0x7f0000001a80)=ANY=[@ANYBLOB="1800000000000000840000000000000020003ba27ffb2cb8aa4282ca800000008400000006000020200000000000000018000000000000008400000000000000060069299350362509007f001800000000000000840000000500000010000000ff7f000018000000000000008400000007000000e0000002000000001800000000000084000000050000000000000006000000"], 0x90}], 0x2, 0x1) [ 1027.782511] QAT: Stopping all acceleration devices. [ 1027.790647] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1027.816478] QAT: Stopping all acceleration devices. [ 1027.842981] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:05:02 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) ioprio_get$uid(0x3, r1) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @rand_addr=0x20}, 'nr0\x00'}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r0, 0x9, 0x1}, 0x10) 19:05:02 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f0000000000)={0x1, 0xb48, {0x0, 0xfffffffffffffffb, 0x1000, 0x9b}}) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x90000) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) 19:05:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc7f000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) getpid() setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@v2={0x7, 0x3, 0xc, 0xa82, 0x47, "7cc19bcb0a44a30ac083d472516d063431a01407203900c25b443b26dfc1a6390e9d6812d889f986c44cacfeef927b5ac8274a7e4145765f1cd8934d034ecdaae482ce34787e70"}, 0x51, 0x1) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) [ 1028.036617] QAT: Stopping all acceleration devices. [ 1028.054217] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1028.079930] QAT: Stopping all acceleration devices. 19:05:02 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="6300000001020000ff010000421e9e1c6248e143ab68832d1bc0faf86ada761b679022da94d3bf43c9c8db0a5a4d96f24e81e404057e367ca6e62ae0703bbc352a18b64c8fad3942b833ad0e689114da58676e1ea7846382bb7a566ac199d6e1acd93b6d7398a2a8ec39e4ed6fa62c"]) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x40000000000, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) 19:05:02 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x6c, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x26e}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0x450}, 0x1, 0x0, 0x0, 0x80}, 0x10) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000080), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r0, &(0x7f0000000200)="6788df3a247d19eabf33674ae5743063fa6c57ead16bc47a39bab8f94e176e596f019d855bd474504e49e8fd46abe6895ab761dc8ec18a31f519912f02a8697d6e231a2f", &(0x7f0000000280)=""/111}, 0x18) 19:05:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1028.259828] QAT: Invalid ioctl [ 1028.294613] QAT: Stopping all acceleration devices. [ 1028.311731] QAT: Invalid ioctl [ 1028.326523] QAT: Invalid ioctl [ 1028.340698] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1028.366860] QAT: Stopping all acceleration devices. 19:05:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xfec0000000000000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[], 0x10014) fcntl$getflags(r1, 0xb) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:05:02 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1000, 0x8000) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040)={0x3f, 0x1f, 0x7, 0x6, 0x9}, 0x14) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:05:02 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @empty, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'veth0\x00'}) 19:05:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:02 executing program 5: socketpair$inet(0x2, 0x80000, 0x4, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080)=0xffffffff, 0x4) prctl$seccomp(0x16, 0x1, &(0x7f0000000040)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x40, 0x0) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000140)) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(r1, 0x5607) [ 1028.701605] QAT: Stopping all acceleration devices. [ 1028.746310] QAT: Stopping all acceleration devices. 19:05:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) getxattr(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)=@known='trusted.overlay.upper\x00', &(0x7f0000002680)=""/16, 0x10) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f00000025c0)={0x441c, 0x2}) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x1d, &(0x7f00000000c0)={@dev}, &(0x7f0000001100)=0x14) ioctl$VT_WAITACTIVE(r2, 0x5607) getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000001140), &(0x7f0000001180)=0x4) bind$nfc_llcp(r2, &(0x7f00000024c0)={0x27, 0x0, 0x2, 0x6, 0x5, 0xff, "c13a97ddfbe7999a0fa70e108b3f927f856ff42cae068c606f347fc5fb2e51af22a8e6e02d0646ecbb3c046dd281f208acb350cf961dca55873d063522189e", 0x10}, 0x60) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000026c0)={0x0, @in={{0x2, 0x40, @multicast2}}}, &(0x7f0000002780)=0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000027c0)={r3, 0x1}, 0x8) io_setup(0x200, &(0x7f0000001280)=0x0) syz_emit_ethernet(0xbb, &(0x7f0000000040)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0008004500002800000000002f9078ac2814aaac14140000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="c6c93e1600d690f7"], &(0x7f0000000000)) io_submit(r4, 0x2, &(0x7f0000002480)=[&(0x7f00000012c0)={0x0, 0x0, 0x0, 0x5, 0x7fff00, r2, &(0x7f0000001480)="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", 0x1000, 0x5, 0x0, 0x3, r2}, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x3, 0x6, r0, &(0x7f0000001300)="0132e435e203dd12edbfd9ea7ff7c6b0f658fab05f9c18944709e383131804917da6fdd4b48f1335cc0ff08e5dc47dbc534e1ee5dde0db809035c87ad01379f922708ce231218170bada422818adfddffc1ebc0e7db1f8efed8f9319c8051e70085c928ec65cf26d214e459bb7816272828513158a8c24561faa8bd7603f51bc8950aa792cfcd125fea921b81c68fce21df6d9cb907906b41e3103e54f434b6f5b430d68b69a2343a3470e0e55d8c87cecb7b70ed3a48aecd64743b4565022", 0xbf, 0x7fff, 0x0, 0x3, r2}]) ioctl$VIDIOC_DECODER_CMD(r2, 0xc0485660, &(0x7f0000002540)={0x7, 0x3, @start={0x9, 0x1}}) 19:05:03 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) r1 = dup2(r0, r0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f00000001c0)={{0x0, 0x3, 0x1, 0x9, '\x00', 0xa70}, 0x0, [0x3ff, 0x4, 0x0, 0x8000, 0x0, 0x10000, 0x3, 0x8000000, 0x400, 0x81, 0x1, 0x0, 0x7, 0x7, 0x7, 0x0, 0x3, 0x40, 0x1000, 0x7, 0x0, 0x8, 0x100, 0x2, 0x6, 0x2db8, 0x8, 0x9, 0x423f, 0x3, 0xa5d, 0x7f, 0xfffffffffffffff9, 0xb3d2aa9, 0x4, 0x1ff, 0x2, 0x80, 0x25, 0x7, 0x8, 0x419, 0x7, 0x101, 0x0, 0x8, 0x2, 0xd70, 0x7f, 0x8, 0x7, 0x8, 0x200, 0x5, 0xffffffffffffff1b, 0x1, 0x7, 0x4, 0x3, 0x4, 0x8, 0x0, 0x6, 0x6, 0x8, 0x2, 0x4, 0x8, 0x6, 0x13b5, 0x6, 0x5, 0x3854, 0x1f3ab2b1, 0x800, 0x1, 0xd708, 0xd, 0x5, 0x7f, 0x8, 0x1, 0x7, 0x7, 0x9, 0x1, 0x4, 0x9, 0x7, 0x1f, 0x3, 0x6, 0x8619, 0x4, 0x2, 0x0, 0x5, 0x8, 0xae6d, 0x2, 0x2, 0x3, 0x1, 0x56a, 0x1ef380000000, 0x8, 0x1, 0x3, 0x4, 0xb4, 0x0, 0x9, 0x8, 0x6, 0x6, 0xee0, 0x1ff, 0x400, 0x10001, 0xa1b0, 0x7ff, 0x400, 0x0, 0x7, 0x20, 0x2bd, 0x5, 0x9], {0x77359400}}) 19:05:03 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @loopback, [0xfe, 0x60000000]}, {0xfffffffffffffffd, @local}, 0x0, {0x2, 0x0, @multicast2}}) 19:05:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1028.916409] QAT: Stopping all acceleration devices. 19:05:03 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000080)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x100000000, @local}, 0x2, {0x2, 0x0, @loopback}}) 19:05:03 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000000)={0xe, {0x80000000, 0x1, 0x20000000000}}) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 1029.103744] QAT: Stopping all acceleration devices. 19:05:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x2, 0x10000) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000001100)={{0x8, 0x9, 0x800, 0x4}, 'syz1\x00', 0x12}) r2 = accept$alg(r0, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x0, 0x10001, 0x10000, 0x5, 0xd9b6, 0x752, 0x4}, 0x1c) write$binfmt_elf32(r2, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:05:03 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000080)={0x7, 0x100, [{0x1, 0x0, 0x4}, {0x7ff, 0x0, 0x7ff}, {0x3, 0x0, 0xf2}, {0x20, 0x0, 0x3}, {0xda, 0x0, 0x1f}, {0x7, 0x0, 0x93}, {0xde3, 0x0, 0x8}]}) 19:05:03 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000180)=@req={0x3fc}, 0x10) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmmsg(r3, &(0x7f0000000000), 0x142, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) read(r0, &(0x7f0000000100), 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r4, 0xc0905664, &(0x7f00000001c0)={0x0, 0x6, [], @bt={0x80000000, 0x7fff, 0x1, 0x8, 0x800, 0x1, 0x6, 0x4}}) 19:05:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xe803000000000000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1029.662859] QAT: Stopping all acceleration devices. [ 1029.719783] QAT: Invalid ioctl 19:05:04 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000000)=0x7) prctl$seccomp(0x16, 0x1, &(0x7f0000000040)) 19:05:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000001280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40008020}, 0xc, &(0x7f0000001180)={&(0x7f00000012c0)=ANY=[@ANYBLOB="9fc287ea561ce54f611a956fe5bf6534455352faafeb3ee7dc6ee31509534f", @ANYRES16=r2, @ANYBLOB="01002cbd7000fbdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r3, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 1029.760999] QAT: Invalid ioctl [ 1029.764471] QAT: Stopping all acceleration devices. 19:05:04 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x26, 0x4000) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000002c0)={0x7, &(0x7f0000000100)=[{0x800, 0x100000001, 0x401, 0x4}, {0x80000000, 0x3f, 0x0, 0x4}, {0x0, 0xdeea, 0x401, 0x8000000}, {0x6529f8ac, 0xffffffffffffff51, 0x0, 0x5}, {0x4, 0x6, 0x7, 0x22}, {0xc3a9, 0x4, 0xf, 0x4}, {0x100000000, 0x20, 0x3, 0x8}]}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0x9) fcntl$getown(r1, 0x9) read(0xffffffffffffffff, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:05:04 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3ff, 0x40) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, r1, &(0x7f0000000540)=""/37, 0x25) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x10c, r2, 0x4, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x689a}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x10}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x14}]}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'yam0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x77f2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'tunl0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x8}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x40041}, 0x80) r3 = socket$bt_hidp(0x1f, 0x3, 0x6) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x8, 0x150, r3, 0x0) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x44, r2, 0x410, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4a}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x32}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @broadcast, [0xfe, 0x60000000]}, {0x0, @dev={[], 0xc}}, 0x1000000, {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') 19:05:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1029.970000] QAT: Stopping all acceleration devices. 19:05:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) r2 = gettid() ptrace$setregset(0x4205, r2, 0x7, &(0x7f0000001100)={&(0x7f0000000080)="62bfd25dcfacfcb2a35498e3c5ce1b3949e9e230ed4ba425ebfdcef4f60ef434ce1636a1c37dff5fae00a2d4be5044b754a8618fff8804ed24e644874552da8786e045e7b6e599ac5ab2f738e3f89e175a58d624291bbf47b9f0d912d13d", 0x5e}) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 1029.998834] QAT: Stopping all acceleration devices. 19:05:04 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) r1 = dup(r0) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000002c0)={@remote, @dev={0xfe, 0x80, [], 0x1e}, @remote, 0xfff, 0x0, 0x6, 0x500, 0x7, 0x800000, r2}) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000340)=ANY=[@ANYBLOB="66696c74657200000000000000fc37d58a3c1b88a80000000000000000000000ab000000764993facaacc5b0c3a5dfe1ebab9137e6bcf986e8e86329909ed2f9be251dc053a2deb4da02000000786b8a04eecf59cfd34f8c5045d9cecff4df602beb1d60629db2dd4cfdbf116fc2e1ecdf514a3d8f3d948cda1c9a15069c981fa27e31032b92dab077a53657b607f03f004fc6a94ce9fb824e9d35516f0bdcf0fa2459986b1f152245d2f5fc4c16a64052491a68e162be5f324350bf69c59d68082c6a3bbfffdee18548d94fdd815353110000e7ffffffffffffff"], &(0x7f0000000000)=0xcf) 19:05:04 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x3, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:05:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:04 executing program 1: socketpair(0xa, 0x2, 0x9abf, &(0x7f0000000080)={0xffffffffffffffff}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x2) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0xfffffffffffffec5}], 0x5fc, &(0x7f0000001400)=""/123, 0x19d, 0x20000000}, 0x0) [ 1030.140670] QAT: Stopping all acceleration devices. 19:05:04 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x3, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x4e24, @multicast2}}) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000080)={0x5, 0x0, 0x4, 0x10000, {r1, r2/1000+10000}, {0x4, 0x0, 0x9, 0x80000000, 0x81, 0x490, "2782380b"}, 0x100, 0x1, @offset=0x4, 0x4}) [ 1030.258542] QAT: Stopping all acceleration devices. [ 1030.261691] kauditd_printk_skb: 22 callbacks suppressed [ 1030.261707] audit: type=1804 audit(1540926304.526:5236): pid=26253 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1778/file0" dev="sda1" ino=16817 res=1 [ 1030.272997] QAT: Invalid ioctl [ 1030.308019] QAT: Stopping all acceleration devices. [ 1030.354962] audit: type=1804 audit(1540926304.616:5237): pid=26260 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1778/file0" dev="sda1" ino=16817 res=1 19:05:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x2000000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1030.543197] net_ratelimit: 7 callbacks suppressed [ 1030.543209] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:05:04 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x101000, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000200)={0x20, "870cfaf5090f2e5640e4bbc588ff2f162c0ff7b2f666b88f2728f24550b803b1", 0x1, 0x8000, 0x3, 0xa100ff, 0x0, 0xe}) renameat2(r0, &(0x7f0000000280)='./file0\x00', r0, &(0x7f00000002c0)='./file0\x00', 0x4) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x10000000020004, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r1, &(0x7f0000000040)="3a6585572c1607f151190626a61cf1031c8f184718e722b16495481011b89b9c3f63b22f44689add81ac86add6806b515ab69b923b83d320c611de1a25403665fd88d61552f96f74df0061cc1744e07bde2b390f4413a607adb28df30cb825abd39947a6f4530cd22a7508708a538b9fd129dc288a1a9659f7599d46b4a18c4ee74363fe8d07d0202a5420ce55663f2148cbdb244c5f8d62ea7d2cb45f00a77fb52101e3d1dbd89e23f1a8385ca021c5c6da6391bd7ec294755c17835a2a67e424998b642aa4a4f2a912b727b114fd54087733a3189e", &(0x7f0000000000)=""/23}, 0x18) 19:05:04 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x9, 0xd, 0x3, "8789e53d11169b7dbec6facc49bf0b2253dd22f97f594b70845e79f8513422b2", 0x7f777d59}) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f00000001c0)) 19:05:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000012c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x804000}, 0xc, &(0x7f0000001280)={&(0x7f0000001140)={0x78, r3, 0x400, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 19:05:04 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() fcntl$lock(r0, 0x6, &(0x7f0000000000)={0x1, 0x0, 0x5, 0x2, r1}) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000080)={0x3, 0xffffffff, 0x2, {0xb, @pix={0x200, 0x5, 0x0, 0x0, 0x9, 0x1, 0xc, 0x7fffffff, 0x1, 0x0, 0x2, 0x6}}}) 19:05:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1030.640395] audit: type=1326 audit(1540926304.896:5238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26217 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1030.724126] QAT: Stopping all acceleration devices. [ 1030.746279] QAT: Invalid ioctl [ 1030.766897] Unknown ioctl -1068476902 [ 1030.768307] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1030.779154] QAT: Stopping all acceleration devices. [ 1030.799817] Unknown ioctl -1068476902 [ 1030.799943] QAT: Invalid ioctl 19:05:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) socket$alg(0x26, 0x5, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:05:05 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000940)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xd, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe10000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x96, &(0x7f0000000000)="8134f6d52e52d32d7c90dcdb88a8", &(0x7f0000000380)=""/150, 0x200}, 0x28) prctl$seccomp(0x16, 0x1, &(0x7f0000000040)) [ 1030.832106] audit: type=1804 audit(1540926305.096:5239): pid=26280 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1779/file0" dev="sda1" ino=16881 res=1 19:05:05 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) r1 = dup2(r0, r0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000000)=""/140) read(r0, &(0x7f0000000100), 0xffffffffffffff7a) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000100)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:05:05 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f00000000c0)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @loopback}}) [ 1030.945559] audit: type=1804 audit(1540926305.176:5240): pid=26289 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1779/file0" dev="sda1" ino=16881 res=1 19:05:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78afc]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1031.010671] QAT: Stopping all acceleration devices. 19:05:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000080)={'tunl0\x00', 0x3}) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 1031.058980] audit: type=1326 audit(1540926305.286:5241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26299 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1031.080433] QAT: Stopping all acceleration devices. [ 1031.149128] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1031.200744] audit: type=1804 audit(1540926305.456:5242): pid=26307 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1780/file0" dev="sda1" ino=16593 res=1 [ 1031.276139] audit: type=1804 audit(1540926305.536:5243): pid=26312 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1780/file0" dev="sda1" ino=16593 res=1 19:05:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x7000000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:05 executing program 3: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_dccp_int(r0, 0x21, 0x11, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r1, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:05:05 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000200)={0x2, r1}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x4, 0x4000) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r3, &(0x7f0000000140)={r2, r3, 0x2}) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000240)=0x20, &(0x7f0000000280)=0x2) ioctl$sock_inet_SIOCSARP(r2, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:05:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup3(r0, r0, 0x80000) inotify_add_watch(r2, &(0x7f0000001dc0)='./file0\x00', 0x2000000) r3 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x80, 0x24042) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001e40)='/dev/qat_adf_ctl\x00', 0x80, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e21, 0xfffffffffffffffd, @loopback, 0x3}, 0x1c) syz_open_dev$media(&(0x7f0000001e00)='/dev/media#\x00', 0xffff, 0x400) recvmmsg(r3, &(0x7f0000001cc0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001100)=""/52, 0x34}, {&(0x7f0000001280)=""/173, 0xad}], 0x2, &(0x7f0000001480)=""/239, 0xef, 0x80000000}, 0x3}, {{&(0x7f0000001340)=@l2, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001580)=""/215, 0xd7}, {&(0x7f0000001680)=""/226, 0xe2}, {&(0x7f0000001780)=""/245, 0xf5}, {&(0x7f0000001880)=""/214, 0xd6}, {&(0x7f0000001980)=""/96, 0x60}], 0x5, &(0x7f0000001180)=""/49, 0x31, 0x71}, 0x3}, {{&(0x7f0000001a80)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/159, 0x9f}, {&(0x7f00000013c0)=""/20, 0x14}, {&(0x7f0000001bc0)=""/133, 0x85}], 0x3, 0x0, 0x0, 0x20}, 0x4}], 0x3, 0x10040, &(0x7f0000001d80)={0x77359400}) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 19:05:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc7f0000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1031.426792] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1031.445317] QAT: Stopping all acceleration devices. 19:05:05 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x0) socketpair$inet6(0xa, 0x807, 0x2, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000100)='veth0\x00') ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8000, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000040)={'ipddp0\x00', 0x9}) [ 1031.478731] audit: type=1804 audit(1540926305.736:5244): pid=26323 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1781/file0" dev="sda1" ino=16673 res=1 19:05:05 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x3, [0x2, 0xfffffffffffffffa, 0x6]}, 0xa) socket$unix(0x1, 0x1, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x8010, r0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000000c0)=0x14, 0xfffffffffffffea2) [ 1031.564837] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1031.607826] audit: type=1804 audit(1540926305.816:5245): pid=26328 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1781/file0" dev="sda1" ino=16673 res=1 [ 1031.674284] QAT: Stopping all acceleration devices. [ 1031.697457] QAT: Stopping all acceleration devices. 19:05:06 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)) r0 = open(&(0x7f0000000000)='./file0\x00', 0x8802, 0xfa) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000100)=0x68) 19:05:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0xfffffffffffffe58}, 0x0) 19:05:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:06 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) r1 = dup(r0) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000100)) read(r0, &(0x7f0000000100), 0x249) r2 = semget$private(0x0, 0x1, 0x0) semctl$GETVAL(r2, 0x3, 0xc, &(0x7f0000000000)=""/144) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:05:06 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @rand_addr=0x1}, 0x8) clock_getres(0x2, &(0x7f0000000080)) [ 1031.926898] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1031.939317] QAT: Stopping all acceleration devices. [ 1031.982258] QAT: Stopping all acceleration devices. 19:05:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xff0f000000000000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:06 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000040), 0x3c0d) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, &(0x7f0000000040)=0x1c, 0x80800) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x10000, 0x8, 0xbd20}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x7}, 0x8) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:05:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97011c0c7e49007b00b032", 0xfee6) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:05:06 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000e000)={r1, &(0x7f0000000000), &(0x7f000000c000), 0x1}, 0x20) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000080)={{0x589f, 0x9, 0x200, 0x1, 0x6, 0x5}, 0x23, 0x9, 0x9, 0x101, 0x80000000, "b772927b99ca98512f7f7db7412a2287b7a3dea10c402a520a4067bbc29237f27c3f84e392c18f2fe24ae6f00dd359115a84d98529f376c62960d4d270a738e5a558acfaf7843676b36d10b3c9cda508a3d5aea210d1ca48d5a974a0e978c2f80cce33b5ede21e04a2df7620e032b69785ed69b627c88d82615217ccb569081e"}) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) [ 1032.401688] QAT: Invalid ioctl [ 1032.415563] QAT: Stopping all acceleration devices. [ 1032.435711] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:05:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x9, 0x0, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x8602, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) write(r4, &(0x7f00000001c0), 0x102f8) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000040)) dup3(r1, r4, 0x0) tkill(r3, 0x1000000000016) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r5 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x18000) write$P9_RVERSION(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB='9P20\r<'], 0x13) r6 = accept$alg(r0, 0x0, 0x0) ioctl$TIOCNOTTY(r5, 0x5422) write$binfmt_elf32(r6, &(0x7f0000001100)=ANY=[], 0xff99) socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) recvmsg(r6, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) [ 1032.452999] QAT: Invalid ioctl [ 1032.467393] QAT: Stopping all acceleration devices. [ 1032.478555] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:05:06 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) modify_ldt$write(0x1, &(0x7f0000000000)={0x1000, 0xffffffffffffffff, 0x1000, 0xb20, 0xcf, 0x10, 0x8, 0x6, 0x9, 0x401}, 0x10) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000080)=0x10, 0x4) [ 1032.628587] QAT: Stopping all acceleration devices. [ 1032.646330] QAT: Stopping all acceleration devices. 19:05:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001280)="97b7f2288a931da590b0322d8ee9d62227ea2d9bc049b8b5bdfe3917f1627d0e504c2399943d48d46ce21b428436c652095ba8c339b22d564cb75b93f0b81b5dca34b8e305e5ffd8d426f81248e44978b3e6e49fb6ac4a5fa56ec09eb4606853ead0801fb6446e6aa13854776b2f09fe9e6a09544d83455eddd44ef79988497943bc248e3fad2bf2b84ff6a0ea490d57a639b68ce8525735bfb59f3778e4e88d9659eea80a827f01d8eb4f8cc5adcfa66aef43127518c43830ac9b26dab4ad95f18ff33f58e6dfe3595faeedeca859cc03fd6d87b328738954a1074488384f1d", 0x13f) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r1 = accept$alg(r0, 0x0, 0x0) r2 = getpid() r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x800, 0x0) recvmsg$kcm(r3, &(0x7f0000001740)={&(0x7f0000001380)=@nfc_llcp, 0x80, &(0x7f0000001180)=[{&(0x7f0000001480)=""/156, 0x9c}, {&(0x7f00000000c0)=""/12, 0xc}, {&(0x7f0000001540)=""/84, 0x54}, {&(0x7f00000015c0)=""/84, 0x54}], 0x4, &(0x7f0000001640)=""/218, 0xda, 0x7}, 0x40002003) perf_event_open(&(0x7f0000001100)={0x1, 0x70, 0x6, 0x7fff, 0xfffffffffffffffe, 0x1, 0x0, 0x2, 0x80400, 0x1, 0x7, 0x39, 0x1, 0xff, 0x0, 0x7, 0x401, 0x8000, 0x2, 0x6620, 0x1400000, 0x8, 0x1, 0x8000, 0x1, 0x4, 0xee, 0x9, 0x6, 0x1, 0x3, 0xbc1, 0x7ff, 0xfff, 0x7, 0x1, 0x6, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x5}, 0x24100, 0x2, 0x6, 0x7, 0x100000000, 0x7, 0x5}, r2, 0x1, r1, 0x2) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:05:07 executing program 5: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x101282, 0x0) ftruncate(r0, 0x4) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x317440, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f00000000c0)={0x100000000, 0x4f, 0x188, 0x9, 0x10001, 0x1, 0x1, 0x4, 0x4, 0x7ff, 0x60000000, 0x8}) prctl$seccomp(0x16, 0x1, &(0x7f0000000040)) 19:05:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:07 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0xc10) 19:05:07 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000040)={0x4}) [ 1032.890043] QAT: Stopping all acceleration devices. [ 1032.913397] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1032.944950] QAT: Invalid ioctl [ 1032.950623] QAT: Stopping all acceleration devices. [ 1032.972614] QAT: Invalid ioctl 19:05:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xfffffdef, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:07 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x4000, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000001100)) r1 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001480)={{{@in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f00000013c0)=0xe8) bind$alg(r1, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) lseek(r1, 0x0, 0x2) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="95ce707c2f7427841f48b123d6ff91ad4accae62048d64f434adc6", 0x1b) write$binfmt_elf32(r2, &(0x7f0000001100)=ANY=[], 0xff99) getresuid(&(0x7f0000001140), &(0x7f0000001180)=0x0, &(0x7f0000001280)) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000012c0)={{{@in6=@ipv4={[], [], @loopback}, @in=@dev={0xac, 0x14, 0x14, 0xf}, 0x4e23, 0x5, 0x4e20, 0x0, 0x2, 0xa0, 0x80, 0x2c, 0x0, r3}, {0x6, 0x5, 0x7f, 0x9, 0x6, 0x8, 0x8, 0x80000001}, {0x8, 0x200, 0x4, 0x2b44}, 0x81, 0x0, 0x1, 0x1, 0x2, 0x1}, {{@in=@broadcast, 0x4d3, 0x32}, 0x2, @in=@rand_addr=0xfff, 0x0, 0x4, 0x3, 0x5, 0x800, 0x0, 0x5}}, 0xe8) recvmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:05:07 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x81, 0x94000) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:05:07 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) ioctl$TCSBRK(r0, 0x5409, 0x5) timer_create(0x2, &(0x7f00000000c0)={0x0, 0x1d, 0x541dc90a5104222a}, &(0x7f0000000100)=0x0) timer_getoverrun(r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) 19:05:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1033.335692] QAT: Stopping all acceleration devices. [ 1033.368173] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1033.400491] QAT: Invalid ioctl [ 1033.405741] QAT: Stopping all acceleration devices. 19:05:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) pwrite64(r1, &(0x7f0000000080)="a435354d85e23a7ca4648704a93a1fae4f4bb5bd7dcc482f556232a8676fba4d216ff2ad8a2c06ac8296bc74280d83634a465d4e2962d6681143d5b48f83325144e95747008be481a2c9b8a353256ba77611c20f14be4607d3abba9e4f0499b4ff0d948dd13f53dff3faf15556c8b4d8add0", 0x72, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:05:07 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400000, 0x0) read(r0, &(0x7f00000000c0), 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000080)={0x80000001, 0x2, 0x1, [], &(0x7f0000000000)=0x2}) [ 1033.430990] QAT: Invalid ioctl 19:05:07 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x4e22, @loopback}, 'tunl0\x00'}) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0xeba, 0x0, 0x3, 0x8, 0xfd8, 0x8, 0xffff}, 0x20) [ 1033.570972] QAT: Stopping all acceleration devices. [ 1033.602229] QAT: Invalid ioctl [ 1033.611727] QAT: Stopping all acceleration devices. [ 1033.617097] QAT: Invalid ioctl 19:05:08 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x800, 0x0) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000140)=""/249) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000080)={0x84, @empty, 0x4e23, 0x0, 'dh\x00', 0xa, 0x8e, 0x5f}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) prctl$seccomp(0x16, 0x1, &(0x7f0000000040)) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f00000000c0)={0x71f0, 0x4, 0x8, 0x2, 0x395, 0xd90, 0x1ff}, 0xc) 19:05:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x281400]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:08 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x4000) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:05:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x400000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000001280)=""/215) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r2, 0x8, 0xc4a64c8334e1ce7c}, 0x10) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:05:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xeffdffff, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:08 executing program 4: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x401, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x200}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r1, 0x5, 0x100000000, 0x1}, &(0x7f0000000100)=0x10) 19:05:08 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x3) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={r2, r3, r4}, 0xc) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:05:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) socketpair(0x7, 0x80004, 0x6, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0xed6f}, &(0x7f0000001100)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000001280)={r3, @in6={{0xa, 0x4e22, 0x8, @ipv4={[], [], @multicast2}, 0x1b6e}}, 0xff, 0x7, 0xffffffffffffff3c, 0x4b0, 0x1}, &(0x7f0000001140)=0x98) 19:05:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d011080]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:08 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) nanosleep(&(0x7f0000000080)={r1, r2+30000000}, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:05:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) rseq(&(0x7f0000000080)={0x0, 0x0, 0x0, 0x7}, 0x20, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$VIDIOC_G_INPUT(r2, 0x80045626, &(0x7f0000001100)) 19:05:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1034.489841] QAT: Stopping all acceleration devices. 19:05:08 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)) r0 = getpgrp(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='pids.events\x00', 0x0, 0x0) setsockopt$inet_mreq(r2, 0x0, 0x23, &(0x7f00000001c0)={@multicast2, @remote}, 0x8) rt_tgsigqueueinfo(r0, r1, 0x1e, &(0x7f0000000080)={0x2f, 0x20, 0xbd4, 0x8}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x280540, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000100)={0x20, 0x2, 0x40, 0xaf1, 0x10000, 0xfffffffffffffffe}) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000140)={0xec3, 0x1, 0x5, 0x51}, 0x8) 19:05:08 executing program 3: rt_sigpending(&(0x7f0000000040), 0x8) r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000080)={0x3, 0x9171, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x441) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000100)=0x2) 19:05:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x3, 0x400100) getsockopt$inet6_tcp_int(r2, 0x6, 0x8, &(0x7f00000014c0), &(0x7f0000001500)=0x4) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x4) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000001300)) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000001100)='nbd\x00') sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000001640)={&(0x7f0000001540)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001600)={&(0x7f0000001580)={0x5c, r3, 0x320, 0x70bd28, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r2}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20004000}, 0x800) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f00000012c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001280)={&(0x7f0000001140)={0x5c, r3, 0x405, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x343}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r2}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0x8050) r4 = add_key$keyring(&(0x7f0000001340)='keyring\x00', &(0x7f0000001380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key$keyring(&(0x7f00000013c0)='keyring\x00', &(0x7f0000001480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$reject(0x13, r4, 0xffff, 0x1ff, r5) 19:05:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x700, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:09 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000000), 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:05:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001100)="3ef5342e4204f99bfe02492afd22f773c6325868348dcd1b116e80e7c79764ea4e163e7b444001dc1f04e233d7d62956afb3e870f4e6df56bc4460b0d5fb4ead27cd90c539f60b2f38bac2df3a9e6887a5a941a30f19058f1ff4ccc0aad9ec578b8a5a9fd2324a21a53483a9876f499302169810bef8ca4fa67a79f1a7d9f9cff909b9370e0fb55e5276846dfe0513e83f6d8383fd5394f2e824b02cf9343532", 0xa0) 19:05:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:09 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x17534c0c, 0x1) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000040), 0x4) 19:05:09 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:05:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xeb8, 0x800) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x0, 0x80000000000000ce, [0x92, 0x3]}, &(0x7f0000001100)=0xc) creat(&(0x7f0000001180)='./file0\x00', 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000001140)={r3, 0x4, 0x1f2}, 0x8) [ 1035.308263] kauditd_printk_skb: 25 callbacks suppressed [ 1035.308278] audit: type=1804 audit(1540926309.566:5271): pid=26556 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1790/file0" dev="sda1" ino=17331 res=1 19:05:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x240, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1035.440144] QAT: Stopping all acceleration devices. [ 1035.537558] audit: type=1326 audit(1540926309.796:5272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26524 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:05:09 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000b8c0)={'ip6_vti0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000003c0)={&(0x7f0000000200)={0x1d, r1}, 0x10, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="00000000000000000300000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="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"], 0x48}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) fcntl$lock(r0, 0x6, &(0x7f0000000100)={0x2, 0x1, 0x9, 0x100, r2}) lseek(r0, 0x0, 0x7) socket$can_bcm(0x1d, 0x2, 0x2) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x100, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000840)={0x5917, {{0x2, 0x4e23, @remote}}, 0x0, 0x4, [{{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x18}}}, {{0x2, 0x4e20}}, {{0x2, 0x4e24, @multicast2}}, {{0x2, 0x4e21, @remote}}]}, 0x290) prctl$seccomp(0x16, 0x1, &(0x7f0000000040)) 19:05:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:09 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)=0x9b}) 19:05:09 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={r1, 0x1, 0x6}, 0x10) 19:05:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x7b) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000013c0), &(0x7f0000001480)=0x8) r1 = syz_open_dev$audion(&(0x7f0000001100)='/dev/audio#\x00', 0xfffffffffffff001, 0x151080) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000001140)={0x0, 0x14}, &(0x7f0000001180)=0x7) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000001280)={r2, 0x2, 0x2, 0x7, 0x2, 0xff}, &(0x7f00000012c0)=0x14) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x3, 0x101000) ioctl$VIDIOC_G_OUTPUT(r3, 0x8004562e, &(0x7f00000000c0)) r4 = accept$alg(r0, 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000001340), &(0x7f0000001380)=0x4) write$binfmt_elf32(r4, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) pipe(&(0x7f0000001300)) 19:05:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x4, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1035.653629] QAT: Stopping all acceleration devices. [ 1035.661838] net_ratelimit: 9 callbacks suppressed [ 1035.661851] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1035.668336] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1035.696707] QAT: Stopping all acceleration devices. 19:05:10 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x40, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000140)={0xc1de, 0x5b}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x101001, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0xbd, 0xea}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000000c0)={r2, 0x7f}, 0x8) [ 1035.722528] audit: type=1804 audit(1540926309.986:5273): pid=26585 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1791/file0" dev="sda1" ino=17335 res=1 19:05:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000001100)='team\x00') getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000001600)={@multicast1, @empty, 0x0}, &(0x7f0000001640)=0xc) getsockname$packet(r1, &(0x7f0000001b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001b80)=0x14) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getpeername$packet(r1, &(0x7f0000001bc0)={0x11, 0x0, 0x0}, &(0x7f0000001c00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000001d80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20004000}, 0xc, &(0x7f0000001d40)={&(0x7f0000001c40)={0xe4, r2, 0x0, 0x70bd29, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xbc, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x4}}]}, 0xe4}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r6 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r6, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r6, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:05:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xfc, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:10 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000300), 0xfffffffffffffe82) times(&(0x7f00000002c0)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000040)={0x6, 0x10001, 0x8000, 0x0, 0x5}) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', 0xffffffffffffffff}, 0x30) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000240)={[{0x9, 0x400, 0x3, 0x5, 0x1, 0x1, 0xa48, 0xb45, 0xfff, 0x10000, 0x4, 0x5, 0xffffffffffffffff}, {0x8, 0x100, 0x7e, 0x6, 0x3, 0x6, 0x1ff, 0x3, 0x400, 0x0, 0x3, 0x8000, 0x1f}, {0x5, 0x2, 0x1, 0x5, 0x7, 0xfffffffffffffeff, 0x1, 0x8, 0x6, 0x18db, 0x4, 0x1, 0x10000}], 0x1ff}) syz_open_procfs$namespace(r1, &(0x7f0000000200)='ns/mnt\x00') [ 1035.796363] audit: type=1326 audit(1540926310.026:5274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26587 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 19:05:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1035.829896] audit: type=1804 audit(1540926310.036:5275): pid=26597 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1791/file0" dev="sda1" ino=17335 res=1 [ 1035.855047] QAT: Stopping all acceleration devices. [ 1035.868953] QAT: Stopping all acceleration devices. 19:05:10 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0xfffffffffffffffd, @dev={0xac, 0x14, 0x14, 0xd}, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x4e1d, @loopback}}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xa8, r1, 0x800, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x411}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x14}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xe761}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsh0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'irlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3ff}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000001) [ 1035.939295] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1036.010470] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1036.057535] audit: type=1804 audit(1540926310.316:5276): pid=26616 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1792/file0" dev="sda1" ino=17137 res=1 [ 1036.062837] QAT: Stopping all acceleration devices. [ 1036.095516] QAT: Stopping all acceleration devices. [ 1036.138356] audit: type=1804 audit(1540926310.396:5277): pid=26624 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1792/file0" dev="sda1" ino=17137 res=1 19:05:10 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400000) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000080)) 19:05:10 executing program 3: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000000240)={0x90, 0x0, 0x2, {0x1, 0x2, 0x5, 0x8, 0x7f, 0x2, {0x3, 0xe1, 0x2, 0x2600000000000000, 0x964, 0x3, 0x8, 0xfff, 0x3ff, 0x8, 0x76e68be6, r1, r2, 0x101, 0x10001}}}, 0x90) r3 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r3, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r3, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:05:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x51c0000000000, 0x80) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000001380)={0x6c, 0x0, &(0x7f0000001140)=[@acquire={0x40046305, 0x3}, @transaction={0x40406300, {0x0, 0x0, 0x4, 0x0, 0x11, 0x0, 0x0, 0x20, 0x8, &(0x7f00000000c0)=[@fda={0x66646185, 0x0, 0x2, 0x8}], &(0x7f0000001100)=[0x40]}}, @exit_looper, @clear_death={0x400c630f, 0x2, 0x4}, @dead_binder_done={0x40086310, 0x1}], 0xd5, 0x0, &(0x7f0000001280)="a419357e85c1c16dd47a55223e50c871159c460515f6af1f155339251b04338e5b212ae781f2c6b8c18c61d1d676a39b7cd5bd4c6a3c4655dc4953b4dc6c9cef008f42f2f490c90970d455939b5308760b367706b289f085403b22677391babed015468fd6e6ebbed43b57e5d898977bdf1ff131bbe927e3651224138ede90070d04c36a92e70a92544af11eba043ab8b24ffab964766e10b9542da1b74dffe26a3793b123d8e86257c2c4c1bb876950037782247496c2882dc8444e95875efdb8ed0296169e2896c58c2cc8457ce6d45ffbc3a53f"}) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:05:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xc001002000000000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:10 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x4e21, @rand_addr=0x2}, {0x307}, 0x0, {0x2, 0x4e21, @remote}}) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}}) 19:05:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1036.495446] audit: type=1326 audit(1540926310.756:5278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26587 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1036.592152] QAT: Invalid ioctl [ 1036.598923] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1036.621631] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1036.622131] QAT: Stopping all acceleration devices. [ 1036.637181] audit: type=1326 audit(1540926310.896:5279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26637 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 1036.666664] QAT: Invalid ioctl [ 1036.679208] QAT: Stopping all acceleration devices. 19:05:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) socketpair(0x5, 0x8000f, 0x7, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x3) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r3 = accept$alg(r0, 0x0, 0x0) openat(r2, &(0x7f0000001100)='./file0\x00', 0x8000, 0x1) write$binfmt_elf32(r0, &(0x7f0000001100)=ANY=[], 0x0) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000080), 0x2) recvmsg(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:05:10 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x7c, 0x0) getsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000000080)=""/112, &(0x7f0000000000)=0x70) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000300)={{0x2, 0x0, @remote, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, 'veth0_to_team\x00'}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) fcntl$setflags(r0, 0x2, 0x0) 19:05:11 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x4, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000000)={0x0, 0x34, [], @raw_data=[0x3, 0x3ff, 0xf563, 0x4, 0x7f, 0xff, 0xf4, 0xfb, 0x1000, 0x3, 0x0, 0x6, 0xa9, 0xa8da, 0x81, 0x8, 0x10000, 0x2, 0x7ff, 0x9, 0x7ff, 0x2, 0x9, 0x28cbaf01, 0x8, 0x6, 0x2b, 0x2, 0xdb, 0xffffffffffffff4d, 0x0, 0x4]}) [ 1036.687607] audit: type=1804 audit(1540926310.946:5280): pid=26636 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir429572729/syzkaller.ljk7lG/1793/file0" dev="sda1" ino=17338 res=1 19:05:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1036.803539] QAT: Stopping all acceleration devices. [ 1036.836975] QAT: Stopping all acceleration devices. 19:05:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001940)="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", 0x26e) socket$can_raw(0x1d, 0x3, 0x1) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) fremovexattr(r0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00') recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:05:11 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x40096101, &(0x7f0000000080)={{0x2, 0x0, @empty, [0xfe, 0x60000000]}, {0x0, @local}, 0x0, {}, 'yam0\x00'}) [ 1036.860588] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1036.980604] QAT: Stopping all acceleration devices. 19:05:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:05:11 executing program 5: prctl$seccomp(0x16, 0x2, &(0x7f0000000080)) 19:05:11 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x7, 0xffffffffffffffff) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8000, 0x4c400) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000500)=0x6, 0x4) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:05:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:11 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d0240316285717070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffff90}}) 19:05:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xff000000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:11 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x1, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r1, &(0x7f0000000100), 0x1e9) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x1) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="73c2b57339e0bfd87b00"], 0xa) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:05:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000140), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@ipv4_newrule={0x20, 0x20, 0x211}, 0x20}}, 0x0) [ 1037.570711] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1037.610408] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:05:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x5, 0x222000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000080)={0x2, 0xfffffffffffffffa, 0x205, 0x9, 0x2, 0x7, 0x5, 0x5e3a, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000001280)={r2, @in={{0x2, 0x4e20, @loopback}}}, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000001100)={r2, 0x4}, 0x8) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r3, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0xfffffe3b}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000001140)=0x1, 0x8) 19:05:11 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mixer\x00', 0x440980, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000440)={{0x2, 0x8b05, 0x40, 0xf5c}, 'syz0\x00', 0x24}) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000240)={0xf, @win={{0x100000000, 0x3, 0x8, 0xfffffffffffffff7}, 0x0, 0x6, &(0x7f0000000100)={{0x8, 0x7, 0x1, 0x5}, &(0x7f00000000c0)={{0x0, 0x3, 0x80000000, 0x5}, &(0x7f0000000080)={{0x197, 0x3, 0x6, 0x47c1}}}}, 0x8, &(0x7f0000000140)="09d642fe947f96d9a3c0d7360c10e5659f6d94f3fafdee79cf5e919ea91e60679911b628778fb2396826770c88092191d736112c1798c2cbbc01b155c1707e0624ef9329dfe6bb895507507e4ca21039f4dfb8c02c1268fcf49a0216009b66f21f0afb3961375e511b8a7da31c134c0e91c89af1c9b6fc23a53d733e37b1e6367de870db0212e5dad99785fa9b13c6cd852817f734e41752e54618c57480877dc85f4478849db6c29a02e45bcc675a9c31ca1ae5d9b036ad82caa9f8dab640e8b6e2fe743b6f51af185331ccc2c158659356a6c368aaa91f", 0x4}}) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000340), &(0x7f0000000380)=0x4) prctl$seccomp(0x16, 0x1, &(0x7f0000000040)) 19:05:12 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000040)={0x1e5, 0x1, 0x5, 0x4a80000000000000, 0x10001, 0x5}) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 1037.708060] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 19:05:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:12 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2000, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0xd6, 0x2, 0x8, "dc79459bc24d01692d7d56d6ffce0b00", "f9eae2b92f3880bcc0ce30110c9e53b88f787e948599a0b3ddf01981eb552eff7050862e5edf6031c9d15053ec013421e4d8589c9e50340571a5820ca0ea2b46e259acef8dedc0d97d362b092fdf5449bb94852a30c7c9124ee56699cff1619d42aefcf3b059d7a5031fc40e5c65a24a40a014afba7cd401e453da59a7fa106730891e9ae7826de1ad8defc4aed2a3290e5ecd3f769d8fff242d4211324c20b71e3ded162d2f77d600af5879d00d215a292ada9d3576d40c249ee5ea6975b70b01"}, 0xd6, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x5b) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 1037.768110] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 19:05:12 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)) 19:05:12 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000000)={0xb, {0x0, 0x4, 0x1, 0x200}}) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) [ 1037.860819] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:05:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r1 = dup3(r0, r0, 0x80000) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000080)=0x6) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000001100)=ANY=[], 0xff99) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000000c0)=0x8, 0x4) recvmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:05:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000011c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x400, 0x0) accept4$unix(r1, 0x0, &(0x7f0000001500)=0x3d3, 0x80800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="97b7f2288a931da590b032", 0xb) r2 = accept$alg(r0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001380)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000014c0)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x100200}, 0xc, &(0x7f0000001480)={&(0x7f00000013c0)={0x20, r3, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000800) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000001100)=@assoc_value={0x0, 0x2}, &(0x7f0000001140)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000001280)={r4, @in6={{0xa, 0x4e22, 0x10000, @dev={0xfe, 0x80, [], 0x1a}, 0xff1}}}, &(0x7f0000001180)=0x84) write$binfmt_elf32(r2, &(0x7f0000001100)=ANY=[], 0xff99) recvmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe4c, &(0x7f0000001240)=[{&(0x7f0000000100)=""/4096, 0x12d3}], 0x24d, &(0x7f0000001400)=""/123, 0x19d}, 0x0) 19:05:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xfec0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:12 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000002c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1, &(0x7f0000000080)}, 0x0) 19:05:12 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) fcntl$getown(r0, 0x9) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:05:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x802}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)={0x0, 0x1, [@random="c992acd1ba13"]}) 19:05:12 executing program 5: prctl$seccomp(0x16, 0x1, &(0x7f0000000040)) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000180}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0x800, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x81) 19:05:12 executing program 1: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r0, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) ppoll(&(0x7f0000000200)=[{r0}, {}, {}], 0x3, &(0x7f0000000280)={0x77359400}, &(0x7f00000002c0)={0x9}, 0x8) 19:05:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1900]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:13 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:05:13 executing program 4: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000040)={0x1e5, 0x1, 0x5, 0x4a80000000000000, 0x10001, 0x5}) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:05:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x1f4, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1038.763901] tls_set_device_offload_rx: netdev lo with no TLS offload 19:05:13 executing program 1: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r0, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) ppoll(&(0x7f0000000200)=[{r0}, {}, {}], 0x3, &(0x7f0000000280)={0x77359400}, &(0x7f00000002c0)={0x9}, 0x8) 19:05:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0xf4010000, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) [ 1038.995670] tls_set_device_offload_rx: netdev lo with no TLS offload 19:05:13 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x7, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) r1 = fcntl$dupfd(r0, 0x406, r0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) 19:05:13 executing program 1: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000180)=@req={0x3fc}, 0x10) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmmsg(r3, &(0x7f0000000000), 0x142, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) read(r0, &(0x7f0000000100), 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r4, 0xc0905664, &(0x7f00000001c0)={0x0, 0x6, [], @bt={0x80000000, 0x7fff, 0x1, 0x8, 0x800, 0x1, 0x6, 0x4}}) 19:05:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:13 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8008447, 0x0) read(r0, &(0x7f0000000100), 0x249) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x3, 0x0, 0x2, [0x0, 0x0, 0x0, 0x1000000], &(0x7f0000000140)}) 19:05:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0x17f62, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}, 0x1c) creat(&(0x7f0000000400)='./file0\x00', 0x0) 19:05:13 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8000000000087d, 0x200000) setsockopt$inet_dccp_int(r0, 0x21, 0x1b, &(0x7f0000000040)=0x3, 0x4) 19:05:13 executing program 1: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000180)=@req={0x3fc}, 0x10) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmmsg(r3, &(0x7f0000000000), 0x142, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) read(r0, &(0x7f0000000100), 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r4, 0xc0905664, &(0x7f00000001c0)={0x0, 0x6, [], @bt={0x80000000, 0x7fff, 0x1, 0x8, 0x800, 0x1, 0x6, 0x4}}) [ 1048.911130] kworker/dying (271) used greatest stack depth: 11712 bytes left [ 1190.351075] INFO: task syz-executor4:26775 blocked for more than 140 seconds. [ 1190.358411] Not tainted 4.19.0+ #311 [ 1190.362743] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1190.370899] syz-executor4 D20760 26775 5800 0x00000004 [ 1190.376543] Call Trace: [ 1190.379247] __schedule+0x8cf/0x21d0 [ 1190.383158] ? __sched_text_start+0x8/0x8 [ 1190.387341] ? check_preemption_disabled+0x48/0x280 [ 1190.392480] ? debug_smp_processor_id+0x1c/0x20 [ 1190.397167] ? perf_trace_lock+0x14d/0x7a0 [ 1190.402365] ? debug_smp_processor_id+0x1c/0x20 [ 1190.407035] ? perf_trace_lock_acquire+0x15b/0x800 [ 1190.412088] ? lock_is_held_type+0x210/0x210 [ 1190.416509] ? perf_trace_lock+0x7a0/0x7a0 [ 1190.420735] ? find_held_lock+0x36/0x1c0 [ 1190.424880] ? zap_class+0x640/0x640 [ 1190.428606] schedule+0xfe/0x460 [ 1190.432111] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1190.437225] ? __schedule+0x21d0/0x21d0 [ 1190.441284] ? find_held_lock+0x36/0x1c0 [ 1190.445366] ? wait_for_completion+0x41f/0x8a0 [ 1190.450050] schedule_timeout+0x1cc/0x260 [ 1190.454310] ? usleep_range+0x1a0/0x1a0 [ 1190.458292] ? wait_for_completion+0x41f/0x8a0 [ 1190.462946] ? trace_hardirqs_off_caller+0x310/0x310 [ 1190.468177] wait_for_completion+0x427/0x8a0 [ 1190.472760] ? vivid_stop_generating_vid_cap+0x291/0x93b [ 1190.478242] ? wait_for_completion_interruptible+0x840/0x840 [ 1190.484139] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1190.489697] ? wake_up_q+0x100/0x100 [ 1190.493488] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1190.499043] ? rcu_pm_notify+0xc0/0xc0 [ 1190.503020] kthread_stop+0x1a9/0x900 [ 1190.506844] ? kthread_unpark+0x160/0x160 [ 1190.511077] ? __lock_is_held+0xb5/0x140 [ 1190.515186] vivid_stop_generating_vid_cap+0x2bc/0x93b [ 1190.520661] ? vivid_start_generating_vid_cap+0x4c0/0x4c0 [ 1190.526347] ? _vb2_fop_release+0x3f/0x2b0 [ 1190.530604] ? debug_smp_processor_id+0x1c/0x20 [ 1190.536233] ? mutex_trylock+0x2b0/0x2b0 [ 1190.540304] ? lock_is_held_type+0x210/0x210 [ 1190.544805] vid_cap_stop_streaming+0x8d/0xe0 [ 1190.549311] ? vid_cap_buf_queue+0x310/0x310 [ 1190.553776] __vb2_queue_cancel+0x171/0xca0 [ 1190.558115] ? lock_downgrade+0x900/0x900 [ 1190.562322] ? __vb2_dqbuf.part.5+0x260/0x260 [ 1190.566824] ? find_held_lock+0x36/0x1c0 [ 1190.571040] ? mark_held_locks+0xc7/0x130 [ 1190.575227] ? kasan_check_write+0x14/0x20 [ 1190.579452] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1190.584450] ? kasan_check_read+0x11/0x20 [ 1190.588658] ? wait_for_completion+0x8a0/0x8a0 [ 1190.593307] ? trace_hardirqs_off_caller+0x310/0x310 [ 1190.598411] ? perf_trace_lock+0x7a0/0x7a0 [ 1190.602703] vb2_core_streamoff+0x60/0x140 [ 1190.606931] __vb2_cleanup_fileio+0x73/0x160 [ 1190.611386] vb2_core_queue_release+0x1e/0x80 [ 1190.615878] _vb2_fop_release+0x1d2/0x2b0 [ 1190.620020] vb2_fop_release+0x77/0xc0 [ 1190.623949] vivid_fop_release+0x18e/0x440 [ 1190.628176] ? vivid_remove+0x460/0x460 [ 1190.632231] ? dev_debug_store+0x140/0x140 [ 1190.636478] v4l2_release+0xfb/0x1a0 [ 1190.640187] __fput+0x385/0xa30 [ 1190.643536] ? get_max_files+0x20/0x20 [ 1190.647434] ? trace_hardirqs_on+0xbd/0x310 [ 1190.651918] ? kasan_check_read+0x11/0x20 [ 1190.656092] ? task_work_run+0x1af/0x2a0 [ 1190.660145] ? trace_hardirqs_off_caller+0x310/0x310 [ 1190.666149] ? filp_close+0x1cd/0x250 [ 1190.669955] ____fput+0x15/0x20 [ 1190.673304] task_work_run+0x1e8/0x2a0 [ 1190.677213] ? task_work_cancel+0x240/0x240 [ 1190.681599] ? copy_fd_bitmaps+0x210/0x210 [ 1190.685844] ? do_syscall_64+0x9a/0x820 [ 1190.689819] exit_to_usermode_loop+0x318/0x380 [ 1190.694479] ? __bpf_trace_sys_exit+0x30/0x30 [ 1190.698988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1190.704593] do_syscall_64+0x6be/0x820 [ 1190.708492] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1190.713985] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1190.718930] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1190.723908] ? trace_hardirqs_on_caller+0x310/0x310 [ 1190.729067] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1190.734186] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1190.739049] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1190.744346] RIP: 0033:0x411021 [ 1190.747554] Code: 83 c4 40 c3 48 8d 05 77 f9 48 00 48 89 04 24 48 c7 44 24 08 0d 00 00 00 e8 ac a8 01 00 0f 0b 48 8d 05 5c f9 48 00 48 89 04 24 <48> c7 44 24 08 0d 00 00 00 e8 91 a8 01 00 0f 0b e8 1a 8f 04 00 e9 [ 1190.767640] RSP: 002b:00007ffc1f758b20 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1190.776292] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000411021 [ 1190.783669] RDX: 0000001b2d420000 RSI: 0000000000730528 RDI: 0000000000000003 [ 1190.791702] RBP: 0000000000000000 R08: ffffffff8100c51a R09: 000000001b41b0be [ 1190.798980] R10: 00007ffc1f758a50 R11: 0000000000000293 R12: 0000000000000000 [ 1190.806373] R13: 0000000000000001 R14: 0000000000000918 R15: 0000000000000004 [ 1190.813712] ? do_syscall_64+0x40a/0x820 [ 1190.817769] [ 1190.817769] Showing all locks held in the system: [ 1190.824172] 1 lock held by khungtaskd/1008: [ 1190.828491] #0: 00000000e679324f (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 1190.837213] 1 lock held by rsyslogd/5559: [ 1190.841542] #0: 000000006eff62ed (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 1190.849533] 2 locks held by getty/5648: [ 1190.853587] #0: 0000000040be71d0 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1190.861903] #1: 000000003d93ae6a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1190.870941] 2 locks held by getty/5649: [ 1190.874999] #0: 0000000001cfdac0 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1190.883389] #1: 00000000cb42989c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1190.892346] 2 locks held by getty/5650: [ 1190.896310] #0: 00000000d17b22cb (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1190.904636] #1: 00000000e8adb645 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1190.913600] 2 locks held by getty/5651: [ 1190.917567] #0: 0000000096f30c16 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1190.926863] #1: 00000000ac7ffe77 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1190.935847] 2 locks held by getty/5652: [ 1190.939827] #0: 000000007a0d359a (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1190.948226] #1: 0000000066ddeff1 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1190.957176] 2 locks held by getty/5653: [ 1190.961247] #0: 00000000dc1e2296 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1190.969521] #1: 0000000003800faf (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1190.978496] 2 locks held by getty/5654: [ 1190.982587] #0: 00000000109199d1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1190.991040] #1: 0000000052f154b6 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1190.999977] [ 1191.001715] ============================================= [ 1191.001715] [ 1191.008785] NMI backtrace for cpu 1 [ 1191.012536] CPU: 1 PID: 1008 Comm: khungtaskd Not tainted 4.19.0+ #311 [ 1191.019204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1191.028548] Call Trace: [ 1191.031145] dump_stack+0x244/0x39d [ 1191.034917] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1191.040114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1191.045657] nmi_cpu_backtrace.cold.1+0x5c/0xa1 [ 1191.050385] ? lapic_can_unplug_cpu.cold.26+0x3f/0x3f [ 1191.055575] nmi_trigger_cpumask_backtrace+0x1b3/0x1ed [ 1191.060847] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1191.066099] watchdog+0xb3e/0x1050 [ 1191.069647] ? reset_hung_task_detector+0xd0/0xd0 [ 1191.074486] ? __kthread_parkme+0xce/0x1a0 [ 1191.078718] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1191.083808] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1191.088902] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1191.093473] ? trace_hardirqs_on+0xbd/0x310 [ 1191.097783] ? kasan_check_read+0x11/0x20 [ 1191.101923] ? __kthread_parkme+0xce/0x1a0 [ 1191.106144] ? trace_hardirqs_off_caller+0x310/0x310 [ 1191.111254] ? trace_hardirqs_off_caller+0x310/0x310 [ 1191.116363] ? lockdep_init_map+0x9/0x10 [ 1191.120426] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1191.125521] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1191.131053] ? __kthread_parkme+0xfb/0x1a0 [ 1191.135292] ? reset_hung_task_detector+0xd0/0xd0 [ 1191.140131] kthread+0x35a/0x440 [ 1191.143490] ? kthread_stop+0x900/0x900 [ 1191.147461] ret_from_fork+0x3a/0x50 [ 1191.151447] Sending NMI from CPU 1 to CPUs 0: [ 1191.156041] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0x6/0x10 [ 1191.158158] Kernel panic - not syncing: hung_task: blocked tasks [ 1191.169778] CPU: 1 PID: 1008 Comm: khungtaskd Not tainted 4.19.0+ #311 [ 1191.176513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1191.185873] Call Trace: [ 1191.188475] dump_stack+0x244/0x39d [ 1191.192102] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1191.197300] panic+0x238/0x4e7 [ 1191.200483] ? add_taint.cold.5+0x16/0x16 [ 1191.204628] ? nmi_trigger_cpumask_backtrace+0x16a/0x1ed [ 1191.210114] ? nmi_trigger_cpumask_backtrace+0x1c4/0x1ed [ 1191.215569] ? nmi_trigger_cpumask_backtrace+0x173/0x1ed [ 1191.221025] ? nmi_trigger_cpumask_backtrace+0x16a/0x1ed [ 1191.226478] watchdog+0xb4f/0x1050 [ 1191.230020] ? reset_hung_task_detector+0xd0/0xd0 [ 1191.234859] ? __kthread_parkme+0xce/0x1a0 [ 1191.239092] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1191.244316] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1191.249415] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1191.253995] ? trace_hardirqs_on+0xbd/0x310 [ 1191.258427] ? kasan_check_read+0x11/0x20 [ 1191.262573] ? __kthread_parkme+0xce/0x1a0 [ 1191.266902] ? trace_hardirqs_off_caller+0x310/0x310 [ 1191.272000] ? trace_hardirqs_off_caller+0x310/0x310 [ 1191.277096] ? lockdep_init_map+0x9/0x10 [ 1191.281156] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1191.286255] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1191.291785] ? __kthread_parkme+0xfb/0x1a0 [ 1191.296104] ? reset_hung_task_detector+0xd0/0xd0 [ 1191.300959] kthread+0x35a/0x440 [ 1191.304463] ? kthread_stop+0x900/0x900 [ 1191.308437] ret_from_fork+0x3a/0x50 [ 1191.313416] Kernel Offset: disabled [ 1191.317053] Rebooting in 86400 seconds..