x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:31:57 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f1000000000000000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:31:57 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:31:57 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f1000000000000000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:31:58 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:31:58 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:31:58 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:31:58 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:31:58 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:31:58 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f1000000000000000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:31:59 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:31:59 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:31:59 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:31:59 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f1000000000000000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:31:59 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:31:59 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1012.222676] kauditd_printk_skb: 37 callbacks suppressed [ 1012.222690] audit: type=1804 audit(1664497919.963:3026): pid=7947 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1100/bus" dev="sda1" ino=15813 res=1 [ 1012.263331] net_ratelimit: 12 callbacks suppressed 00:32:00 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1012.263341] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:00 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:00 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1012.508177] audit: type=1804 audit(1664497920.083:3027): pid=7949 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1034/bus" dev="sda1" ino=15667 res=1 00:32:00 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:00 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:00 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1012.738502] audit: type=1804 audit(1664497920.143:3028): pid=7945 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1135/bus" dev="sda1" ino=15812 res=1 [ 1012.773696] audit: type=1804 audit(1664497920.313:3029): pid=7954 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1100/bus" dev="sda1" ino=15813 res=1 00:32:00 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:00 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1012.966267] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1013.000397] audit: type=1804 audit(1664497920.683:3030): pid=7977 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1136/bus" dev="sda1" ino=15266 res=1 [ 1013.041673] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:00 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1013.091640] audit: type=1804 audit(1664497920.733:3031): pid=7980 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1035/bus" dev="sda1" ino=15669 res=1 [ 1013.198255] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1013.389678] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1013.452982] audit: type=1804 audit(1664497920.933:3032): pid=7983 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1101/bus" dev="sda1" ino=15347 res=1 00:32:01 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:01 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1013.625989] audit: type=1804 audit(1664497921.043:3033): pid=7980 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1035/bus" dev="sda1" ino=15669 res=1 00:32:01 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:01 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:01 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1013.790569] audit: type=1804 audit(1664497921.053:3034): pid=7984 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1136/bus" dev="sda1" ino=15266 res=1 00:32:01 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1013.847374] audit: type=1804 audit(1664497921.073:3035): pid=7985 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1101/bus" dev="sda1" ino=15347 res=1 [ 1013.932374] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1013.976082] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1014.017551] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1014.265037] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:02 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:02 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1014.847537] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:02 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:02 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:02 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:03 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:03 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:03 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:03 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:03 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:03 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:03 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:03 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:03 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:04 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:04 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:04 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:04 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:04 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:04 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:04 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:04 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:04 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:04 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:05 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:05 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:05 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1017.433308] kauditd_printk_skb: 28 callbacks suppressed [ 1017.433321] audit: type=1804 audit(1664497925.173:3064): pid=8167 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1039/bus" dev="sda1" ino=13921 res=1 00:32:05 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:05 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1017.540040] net_ratelimit: 9 callbacks suppressed [ 1017.540050] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1017.545198] audit: type=1804 audit(1664497925.273:3065): pid=8179 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1141/bus" dev="sda1" ino=15971 res=1 [ 1017.695139] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:05 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1017.747489] audit: type=1804 audit(1664497925.343:3066): pid=8178 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1141/bus" dev="sda1" ino=15971 res=1 00:32:05 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:05 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1017.879724] audit: type=1804 audit(1664497925.573:3067): pid=8179 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1141/bus" dev="sda1" ino=15971 res=1 00:32:05 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:05 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1018.055258] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1018.091510] audit: type=1804 audit(1664497925.823:3068): pid=8210 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1040/bus" dev="sda1" ino=13931 res=1 [ 1018.149608] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:05 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1018.198652] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:06 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:06 executing program 3: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1018.453268] audit: type=1804 audit(1664497926.193:3069): pid=8213 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1040/bus" dev="sda1" ino=13931 res=1 00:32:06 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:06 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1018.799733] audit: type=1804 audit(1664497926.543:3070): pid=8233 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1142/bus" dev="sda1" ino=15442 res=1 00:32:06 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:06 executing program 3: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:06 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:06 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1019.040090] audit: type=1804 audit(1664497926.783:3071): pid=8242 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1109/bus" dev="sda1" ino=15668 res=1 00:32:06 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1019.143731] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1019.230861] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1019.266134] audit: type=1804 audit(1664497926.853:3072): pid=8252 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1041/bus" dev="sda1" ino=14504 res=1 [ 1019.337350] audit: type=1804 audit(1664497926.943:3073): pid=8255 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1143/bus" dev="sda1" ino=14508 res=1 00:32:07 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:07 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:07 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:07 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:07 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:07 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1019.977877] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:07 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:07 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1020.155994] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1020.211982] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:08 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:08 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:08 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:08 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:09 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:09 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f1"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:09 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:09 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:09 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:09 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:09 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:10 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:10 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:10 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:10 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:10 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f1"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:10 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040), 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1022.686796] kauditd_printk_skb: 18 callbacks suppressed [ 1022.686810] audit: type=1804 audit(1664497930.424:3092): pid=8378 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1114/bus" dev="sda1" ino=15329 res=1 00:32:10 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:10 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:10 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1022.924297] net_ratelimit: 4 callbacks suppressed [ 1022.924317] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1022.986559] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1022.990196] audit: type=1804 audit(1664497930.614:3093): pid=8386 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1146/bus" dev="sda1" ino=14506 res=1 00:32:10 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:10 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040), 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1023.177208] audit: type=1804 audit(1664497930.644:3094): pid=8388 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir382537062/syzkaller.rSJ5UT/1068/bus" dev="sda1" ino=15994 res=1 [ 1023.281280] audit: type=1804 audit(1664497930.714:3095): pid=8391 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1115/bus" dev="sda1" ino=14512 res=1 00:32:11 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1023.499298] audit: type=1804 audit(1664497930.804:3096): pid=8393 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2307338687/syzkaller.OH2NBm/1066/bus" dev="sda1" ino=15983 res=1 00:32:11 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f1"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1023.598682] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1023.754205] audit: type=1804 audit(1664497930.994:3097): pid=8390 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1146/bus" dev="sda1" ino=14506 res=1 [ 1023.832163] audit: type=1804 audit(1664497931.294:3098): pid=8411 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1045/bus" dev="sda1" ino=15329 res=1 [ 1023.832236] audit: type=1804 audit(1664497931.464:3099): pid=8402 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir382537062/syzkaller.rSJ5UT/1068/bus" dev="sda1" ino=15994 res=1 [ 1023.891405] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1023.897725] audit: type=1804 audit(1664497931.624:3100): pid=8423 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1147/bus" dev="sda1" ino=16003 res=1 00:32:11 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040), 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:11 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1024.148887] audit: type=1804 audit(1664497931.654:3101): pid=8411 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1045/bus" dev="sda1" ino=15329 res=1 00:32:12 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f1"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:12 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:12 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:12 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:12 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:12 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:12 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1024.982253] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1025.003927] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:12 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:12 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) socket(0x10, 0x803, 0x0) [ 1025.134726] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:13 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:13 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:13 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1025.987600] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:14 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:14 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) socket(0x10, 0x803, 0x0) 00:32:14 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:14 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:14 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:14 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:14 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:14 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) socket(0x10, 0x803, 0x0) 00:32:14 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1026.684078] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1026.710898] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:14 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:14 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:14 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:15 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:15 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100000000000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:15 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:15 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:15 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:15 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, 0x0, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1027.735797] kauditd_printk_skb: 23 callbacks suppressed [ 1027.735811] audit: type=1804 audit(1664497935.474:3125): pid=8560 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1151/bus" dev="sda1" ino=14194 res=1 [ 1028.040695] audit: type=1804 audit(1664497935.514:3126): pid=8551 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1048/bus" dev="sda1" ino=14099 res=1 [ 1028.073821] audit: type=1804 audit(1664497935.654:3127): pid=8565 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1124/bus" dev="sda1" ino=13876 res=1 [ 1028.242479] audit: type=1804 audit(1664497935.684:3128): pid=8563 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1151/bus" dev="sda1" ino=14194 res=1 00:32:16 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:16 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:16 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100000000000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:16 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, 0x0, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:16 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:16 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f1000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:16 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1028.685443] audit: type=1804 audit(1664497936.424:3129): pid=8589 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1049/bus" dev="sda1" ino=14743 res=1 [ 1028.718015] net_ratelimit: 3 callbacks suppressed [ 1028.718076] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:16 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) socket(0x10, 0x803, 0x0) [ 1028.772837] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1028.833627] audit: type=1804 audit(1664497936.444:3130): pid=8591 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1152/bus" dev="sda1" ino=14785 res=1 [ 1028.873851] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:16 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1028.923029] audit: type=1804 audit(1664497936.454:3131): pid=8588 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1125/bus" dev="sda1" ino=14723 res=1 [ 1028.958012] audit: type=1804 audit(1664497936.554:3132): pid=8599 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir382537062/syzkaller.rSJ5UT/1072/bus" dev="sda1" ino=14463 res=1 00:32:16 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1029.079505] audit: type=1804 audit(1664497936.724:3133): pid=8597 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1152/bus" dev="sda1" ino=14785 res=1 [ 1029.173013] audit: type=1804 audit(1664497936.864:3134): pid=8589 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1049/bus" dev="sda1" ino=14743 res=1 00:32:17 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) socket(0x10, 0x803, 0x0) 00:32:17 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:17 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f1000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:17 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100000000000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:17 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:17 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:17 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) socket(0x10, 0x2, 0x0) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, 0x0, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r1, r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:17 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f1000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1030.145697] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1030.220118] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1030.254155] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:18 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) socket(0x10, 0x2, 0x0) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, 0x0, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r1, r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:18 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:18 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:18 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:18 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:18 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) socket(0x10, 0x803, 0x0) 00:32:19 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/20]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:19 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f1000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:19 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:19 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100000000000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:19 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:19 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100000000000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1031.686704] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1031.809846] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1031.827488] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1031.836987] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:19 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:19 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:20 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:20 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:20 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:20 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/20]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:20 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r1, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1032.924714] kauditd_printk_skb: 21 callbacks suppressed [ 1032.924727] audit: type=1804 audit(1664497940.664:3156): pid=8743 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1155/bus" dev="sda1" ino=14865 res=1 [ 1033.138492] audit: type=1804 audit(1664497940.744:3157): pid=8747 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1132/bus" dev="sda1" ino=14868 res=1 00:32:20 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1033.197748] audit: type=1804 audit(1664497940.864:3158): pid=8744 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1052/bus" dev="sda1" ino=15012 res=1 00:32:21 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r1, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1033.383361] audit: type=1804 audit(1664497940.914:3159): pid=8745 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1155/bus" dev="sda1" ino=14865 res=1 [ 1033.427527] audit: type=1804 audit(1664497941.124:3160): pid=8751 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1052/bus" dev="sda1" ino=15012 res=1 [ 1033.652245] audit: type=1804 audit(1664497941.334:3161): pid=8761 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1133/bus" dev="sda1" ino=14849 res=1 [ 1033.793350] audit: type=1804 audit(1664497941.534:3162): pid=8762 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1133/bus" dev="sda1" ino=14849 res=1 00:32:21 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/20]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:21 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f1000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:21 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:21 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r1, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:21 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/20]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1034.071904] audit: type=1804 audit(1664497941.814:3163): pid=8779 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1156/bus" dev="sda1" ino=15140 res=1 [ 1034.107741] net_ratelimit: 3 callbacks suppressed [ 1034.107769] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:21 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) socket(0x10, 0x2, 0x0) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r0, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1034.174368] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1034.211451] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1034.216256] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:22 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1034.628179] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1034.868413] audit: type=1804 audit(1664497941.854:3165): pid=8780 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1053/bus" dev="sda1" ino=15077 res=1 [ 1034.993937] audit: type=1804 audit(1664497941.854:3164): pid=8781 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir382537062/syzkaller.rSJ5UT/1075/bus" dev="sda1" ino=15185 res=1 00:32:22 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) socket(0x10, 0x2, 0x0) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r0, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:22 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:23 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/21]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:23 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1035.485574] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:23 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) socket(0x10, 0x2, 0x0) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r0, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1035.649661] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1035.936882] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:24 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/20]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1036.697173] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:24 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:24 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r0, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r1, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:24 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:24 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:24 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/21]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:24 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r0, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r1, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1037.149330] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:25 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:25 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r0, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r1, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1037.928048] kauditd_printk_skb: 21 callbacks suppressed [ 1037.928061] audit: type=1804 audit(1664497945.665:3187): pid=8868 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir2307338687/syzkaller.OH2NBm/1082/bus" dev="sda1" ino=14246 res=1 [ 1037.970958] audit: type=1804 audit(1664497945.715:3188): pid=8884 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1137/bus" dev="sda1" ino=14250 res=1 00:32:25 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/21]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:25 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:26 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1038.372885] audit: type=1804 audit(1664497946.115:3189): pid=8886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1137/bus" dev="sda1" ino=14250 res=1 [ 1038.709109] audit: type=1804 audit(1664497946.185:3190): pid=8895 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1056/bus" dev="sda1" ino=15537 res=1 [ 1038.827906] audit: type=1804 audit(1664497946.205:3191): pid=8893 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1159/bus" dev="sda1" ino=15569 res=1 [ 1038.852128] audit: type=1804 audit(1664497946.335:3192): pid=8896 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1159/bus" dev="sda1" ino=15569 res=1 [ 1038.876539] audit: type=1804 audit(1664497946.425:3193): pid=8902 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1056/bus" dev="sda1" ino=15537 res=1 00:32:26 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/20]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1039.208306] audit: type=1804 audit(1664497946.955:3194): pid=8909 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir382537062/syzkaller.rSJ5UT/1077/bus" dev="sda1" ino=14754 res=1 [ 1039.246244] net_ratelimit: 5 callbacks suppressed 00:32:27 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:27 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:27 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:27 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:27 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1039.246271] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1039.532095] audit: type=1804 audit(1664497947.275:3195): pid=8922 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1138/bus" dev="sda1" ino=15794 res=1 [ 1039.535588] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1039.590183] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1039.605956] audit: type=1804 audit(1664497947.325:3196): pid=8923 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1057/bus" dev="sda1" ino=15842 res=1 00:32:27 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1039.692806] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1039.773705] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:27 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:28 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:28 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1040.567855] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:28 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1040.900250] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:28 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1041.202126] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:29 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1041.904494] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:29 executing program 3: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:29 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:29 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:29 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:29 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1042.238793] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:30 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r0, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r1, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:30 executing program 2: mkdir(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:30 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:30 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:30 executing program 2: mkdir(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:30 executing program 3: mkdir(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1043.196834] kauditd_printk_skb: 21 callbacks suppressed [ 1043.196848] audit: type=1804 audit(1664497950.935:3218): pid=9032 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1141/bus" dev="sda1" ino=14979 res=1 [ 1043.508039] audit: type=1804 audit(1664497950.995:3219): pid=9033 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1163/bus" dev="sda1" ino=15125 res=1 [ 1043.543308] audit: type=1804 audit(1664497951.205:3220): pid=9035 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1141/bus" dev="sda1" ino=14979 res=1 [ 1043.571857] audit: type=1804 audit(1664497951.225:3221): pid=9037 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1163/bus" dev="sda1" ino=15125 res=1 00:32:31 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r1, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:31 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:31 executing program 2: mkdir(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:31 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:31 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:31 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:31 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1043.948383] audit: type=1804 audit(1664497951.685:3222): pid=9062 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1060/bus" dev="sda1" ino=14252 res=1 00:32:31 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0/file0\x00'}) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r1, r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1044.414010] audit: type=1804 audit(1664497951.735:3223): pid=9064 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2307338687/syzkaller.OH2NBm/1087/bus" dev="sda1" ino=14249 res=1 00:32:32 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1044.449457] audit: type=1804 audit(1664497951.745:3224): pid=9063 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1142/bus" dev="sda1" ino=14754 res=1 00:32:32 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1044.519484] audit: type=1804 audit(1664497951.795:3225): pid=9065 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1164/bus" dev="sda1" ino=15906 res=1 [ 1044.578641] audit: type=1804 audit(1664497951.945:3226): pid=9073 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir2307338687/syzkaller.OH2NBm/1087/bus" dev="sda1" ino=14249 res=1 00:32:32 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, 0x0, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1044.797525] audit: type=1804 audit(1664497952.055:3227): pid=9078 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1164/bus" dev="sda1" ino=15906 res=1 00:32:32 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:32 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1044.875782] net_ratelimit: 8 callbacks suppressed [ 1044.875792] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:32 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:32 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1045.218617] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1045.482833] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1045.508507] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:33 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:33 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:33 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:33 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1046.021120] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:33 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1046.252889] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:34 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:34 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:34 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:34 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1046.634816] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1046.769406] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1046.817322] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:34 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r0, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r1, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:35 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1400000000000) creat(0x0, 0x0) [ 1047.849746] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:35 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:35 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0/file0\x00'}) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:35 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:35 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r0, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r1, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:35 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:35 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r0, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r1, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1048.300578] kauditd_printk_skb: 22 callbacks suppressed [ 1048.300592] audit: type=1804 audit(1664497956.045:3250): pid=9207 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1146/bus" dev="sda1" ino=15123 res=1 00:32:36 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r1, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:36 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0/file0\x00'}) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1048.765766] audit: type=1804 audit(1664497956.085:3251): pid=9210 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1063/bus" dev="sda1" ino=13886 res=1 00:32:36 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1400000000000) creat(0x0, 0x0) 00:32:36 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r1, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:36 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1049.045709] audit: type=1804 audit(1664497956.265:3252): pid=9212 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir382537062/syzkaller.rSJ5UT/1083/bus" dev="sda1" ino=15270 res=1 00:32:36 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1049.377499] audit: type=1804 audit(1664497956.465:3253): pid=9214 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1146/bus" dev="sda1" ino=15123 res=1 [ 1049.431749] audit: type=1804 audit(1664497956.555:3254): pid=9215 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1063/bus" dev="sda1" ino=13886 res=1 [ 1049.462669] audit: type=1804 audit(1664497956.685:3255): pid=9225 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir382537062/syzkaller.rSJ5UT/1083/bus" dev="sda1" ino=15270 res=1 [ 1049.966674] audit: type=1804 audit(1664497957.065:3256): pid=9240 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1147/bus" dev="sda1" ino=15123 res=1 [ 1050.176771] audit: type=1804 audit(1664497957.185:3257): pid=9244 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1064/bus" dev="sda1" ino=13887 res=1 [ 1050.201009] audit: type=1804 audit(1664497957.235:3258): pid=9245 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1169/bus" dev="sda1" ino=14126 res=1 [ 1050.201072] audit: type=1804 audit(1664497957.455:3259): pid=9243 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1147/bus" dev="sda1" ino=15123 res=1 00:32:38 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:38 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r1, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:38 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1400000000000) creat(0x0, 0x0) 00:32:38 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:38 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:38 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1400000000000) creat(0x0, 0x0) [ 1050.855380] net_ratelimit: 6 callbacks suppressed [ 1050.855408] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:38 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1051.024841] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1051.147338] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1051.265428] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:39 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:39 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1052.007853] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:40 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1052.306317] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:40 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:40 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1052.883725] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1052.988307] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:41 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, 0x0, 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:41 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0/file0\x00'}) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:41 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:41 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:41 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:41 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0/file0\x00'}) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1053.712059] kauditd_printk_skb: 14 callbacks suppressed [ 1053.712073] audit: type=1804 audit(1664497961.456:3274): pid=9318 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1171/bus" dev="sda1" ino=14126 res=1 00:32:41 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, 0x0, 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1053.891303] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1053.899578] audit: type=1804 audit(1664497961.606:3275): pid=9338 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1150/bus" dev="sda1" ino=15466 res=1 [ 1054.005399] audit: type=1804 audit(1664497961.746:3276): pid=9336 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1067/bus" dev="sda1" ino=15468 res=1 [ 1054.043816] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:42 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, 0x0, 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:42 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1054.427102] audit: type=1804 audit(1664497961.866:3277): pid=9348 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir382537062/syzkaller.rSJ5UT/1085/bus" dev="sda1" ino=15459 res=1 [ 1054.451933] audit: type=1804 audit(1664497961.946:3278): pid=9336 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1067/bus" dev="sda1" ino=15468 res=1 [ 1054.477451] audit: type=1804 audit(1664497961.986:3279): pid=9338 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1150/bus" dev="sda1" ino=15466 res=1 00:32:42 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0/file0\x00'}) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:42 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1054.799639] audit: type=1804 audit(1664497962.396:3280): pid=9365 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1068/bus" dev="sda1" ino=16037 res=1 [ 1054.825624] audit: type=1804 audit(1664497962.536:3281): pid=9350 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir382537062/syzkaller.rSJ5UT/1085/bus" dev="sda1" ino=15459 res=1 00:32:42 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:42 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r1, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:42 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, 0x0, 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1055.221707] audit: type=1804 audit(1664497962.716:3282): pid=9368 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1068/bus" dev="sda1" ino=16037 res=1 [ 1055.358142] audit: type=1804 audit(1664497962.806:3283): pid=9374 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1151/bus" dev="sda1" ino=14125 res=1 00:32:43 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1055.668641] ieee802154 phy0 wpan0: encryption failed: -22 [ 1055.674253] ieee802154 phy1 wpan1: encryption failed: -22 00:32:43 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/25]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:43 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r1, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:43 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:43 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:43 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/25]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:43 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r1, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:43 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1056.119095] net_ratelimit: 4 callbacks suppressed [ 1056.119105] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:43 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:44 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1056.331000] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:44 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:44 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1056.457394] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1056.569332] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1056.596882] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:44 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1057.034709] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:44 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r1, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:44 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:44 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:45 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:45 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:45 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:45 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r1, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:45 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1057.624195] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:45 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:45 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:45 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r1, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1057.916948] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:45 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1058.050422] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1058.076844] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:46 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:46 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:46 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(0x0, 0x0) 00:32:46 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1058.731796] kauditd_printk_skb: 20 callbacks suppressed [ 1058.731811] audit: type=1804 audit(1664497966.476:3304): pid=9509 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1156/bus" dev="sda1" ino=13879 res=1 [ 1059.143128] audit: type=1804 audit(1664497966.626:3305): pid=9514 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1072/bus" dev="sda1" ino=14051 res=1 [ 1059.316562] audit: type=1804 audit(1664497966.766:3306): pid=9486 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir2307338687/syzkaller.OH2NBm/1097/bus" dev="sda1" ino=14258 res=1 [ 1059.341604] audit: type=1804 audit(1664497966.916:3307): pid=9509 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1156/bus" dev="sda1" ino=13879 res=1 [ 1059.582097] audit: type=1804 audit(1664497967.186:3308): pid=9503 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1179/bus" dev="sda1" ino=14116 res=1 00:32:47 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:47 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:47 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:47 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(0x0, 0x0) 00:32:47 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:47 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:47 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1060.147640] audit: type=1804 audit(1664497967.886:3309): pid=9539 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1157/bus" dev="sda1" ino=14051 res=1 00:32:48 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:48 executing program 3: unshare(0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="ed00000018008109e00f80ecdb4cb9060202656800030905e87c55a1bc000900b8002e992500000009000b402500fe79000000000b000500e000050103ac034000b57f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090700001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000733e4f6d021f003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04accdf634c010300bd43998536d5e18f9c4cc6514f9a9bdffb803a99cace81ed0b7fece0b42a00000000d40dd6e4edef3d93452a92ed0680f69d5c48ed00390bb5604120e00d90f84a", 0xec}], 0x1}, 0x0) [ 1060.574758] audit: type=1804 audit(1664497967.936:3310): pid=9538 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1073/bus" dev="sda1" ino=14001 res=1 [ 1060.600624] audit: type=1804 audit(1664497967.946:3311): pid=9541 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir382537062/syzkaller.rSJ5UT/1090/bus" dev="sda1" ino=14002 res=1 [ 1060.625780] audit: type=1804 audit(1664497968.266:3312): pid=9545 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1157/bus" dev="sda1" ino=14051 res=1 [ 1060.657739] audit: type=1804 audit(1664497968.296:3313): pid=9541 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir382537062/syzkaller.rSJ5UT/1090/bus" dev="sda1" ino=14002 res=1 00:32:48 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1060.792990] IPVS: ftp: loaded support on port[0] = 21 00:32:48 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:48 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:48 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(0x0, 0x0) 00:32:48 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:48 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1061.223456] net_ratelimit: 6 callbacks suppressed [ 1061.223483] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1061.238800] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:49 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:49 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:49 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:49 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:49 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:50 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1062.253091] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:50 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1062.430350] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:50 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1062.740162] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1063.001265] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:51 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:51 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:51 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/25]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:51 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:51 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1064.089831] kauditd_printk_skb: 11 callbacks suppressed [ 1064.089845] audit: type=1804 audit(1664497971.836:3325): pid=9670 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1187/bus" dev="sda1" ino=14627 res=1 [ 1064.103205] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:51 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1064.222433] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1064.362227] audit: type=1804 audit(1664497971.936:3326): pid=9676 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1161/bus" dev="sda1" ino=14641 res=1 [ 1064.705622] audit: type=1804 audit(1664497972.236:3327): pid=9676 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1161/bus" dev="sda1" ino=14641 res=1 [ 1064.872443] audit: type=1804 audit(1664497972.616:3328): pid=9679 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1187/bus" dev="sda1" ino=14627 res=1 00:32:52 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:52 executing program 3: mkdir(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:52 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:52 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:52 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:52 executing program 3: mkdir(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:52 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:53 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1065.214680] audit: type=1804 audit(1664497972.956:3329): pid=9707 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1162/bus" dev="sda1" ino=14643 res=1 [ 1065.228286] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1065.308982] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1065.660026] audit: type=1804 audit(1664497973.016:3330): pid=9709 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1076/bus" dev="sda1" ino=14674 res=1 [ 1065.891081] audit: type=1804 audit(1664497973.216:3331): pid=9711 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1162/bus" dev="sda1" ino=14643 res=1 [ 1066.082007] audit: type=1804 audit(1664497973.826:3332): pid=9717 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1076/bus" dev="sda1" ino=14674 res=1 00:32:54 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:54 executing program 3: mkdir(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:54 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:54 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1066.532371] audit: type=1804 audit(1664497974.276:3333): pid=9736 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1188/bus" dev="sda1" ino=14897 res=1 [ 1066.598719] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:54 executing program 4: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:54 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:54 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:54 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:54 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1067.100932] audit: type=1804 audit(1664497974.846:3334): pid=9739 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1188/bus" dev="sda1" ino=14897 res=1 [ 1067.264636] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:55 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:55 executing program 4: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:55 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:55 executing program 5: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:55 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:55 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:55 executing program 1: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:55 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:55 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:56 executing program 1: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:56 executing program 5: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:56 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:56 executing program 3: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1068.304870] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:56 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e00"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:56 executing program 5: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:56 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:56 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e00"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:56 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:56 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:56 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:56 executing program 5: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:56 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:56 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:56 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e00"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:56 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1068.960717] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:56 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:57 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:57 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:57 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:57 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:57 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d1"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1069.373759] kauditd_printk_skb: 5 callbacks suppressed [ 1069.373773] audit: type=1804 audit(1664497977.107:3340): pid=9839 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1165/bus" dev="sda1" ino=14786 res=1 00:32:57 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d1"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:57 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/25]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:57 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:57 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r1, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:57 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) socket(0x10, 0x803, 0x0) 00:32:57 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1069.784357] audit: type=1804 audit(1664497977.527:3341): pid=9874 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir382537062/syzkaller.rSJ5UT/1103/bus" dev="sda1" ino=14691 res=1 [ 1069.804724] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:57 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d1"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1069.833055] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1069.861086] audit: type=1804 audit(1664497977.567:3342): pid=9880 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1166/bus" dev="sda1" ino=14693 res=1 00:32:57 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r1, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:57 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) socket(0x10, 0x803, 0x0) 00:32:57 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r1, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:58 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) socket(0x10, 0x2, 0x0) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, 0x0, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r1, r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1070.262891] audit: type=1804 audit(1664497977.947:3343): pid=9874 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir382537062/syzkaller.rSJ5UT/1103/bus" dev="sda1" ino=14691 res=1 00:32:58 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d9762201"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1070.352971] audit: type=1804 audit(1664497977.957:3344): pid=9884 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1166/bus" dev="sda1" ino=14693 res=1 00:32:58 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) socket(0x10, 0x2, 0x0) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, 0x0, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r1, r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:58 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0/file0\x00'}) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r1, r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:58 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:58 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r1, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r3, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r3, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r2, r3) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:58 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:58 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0/file0\x00'}) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r1, r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:58 executing program 3: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000500)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000540)=0x1c) ioctl$BTRFS_IOC_SPACE_INFO(r0, 0xc0109414, &(0x7f0000000580)={0x4c2, 0x80000000, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0xa02000000000000, 0x60, &(0x7f0000000000)={'filter\x00', 0x2, 0x4, 0x400, 0x210, 0x0, 0x108, 0x318, 0x318, 0x318, 0x7fffffe, 0x0, {[{{@uncond, 0xc0, 0x108, 0x71000000}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@arp={@rand_addr, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@remote}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'lo\x00', 'ip6tnl0\x00'}, 0xc0, 0x108}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}, {{@uncond, 0xc0, 0x108}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0xc0, 0xe8, 0x0, {0x1d000000}}, {0x28}}}}, 0x450) 00:32:58 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:58 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1070.754020] audit: type=1804 audit(1664497978.497:3345): pid=9927 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1167/bus" dev="sda1" ino=13951 res=1 [ 1070.798372] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:58 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:58 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0/file0\x00'}) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r1, r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:58 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:58 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:58 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1071.097713] audit: type=1804 audit(1664497978.847:3347): pid=9934 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1167/bus" dev="sda1" ino=13951 res=1 [ 1071.192238] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1071.260607] FAULT_INJECTION: forcing a failure. [ 1071.260607] name failslab, interval 1, probability 0, space 0, times 1 [ 1071.271319] audit: type=1804 audit(1664497978.837:3346): pid=9945 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1087/bus" dev="sda1" ino=13941 res=1 [ 1071.417510] CPU: 0 PID: 9945 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1071.425348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1071.434710] Call Trace: [ 1071.437312] dump_stack+0x1fc/0x2ef [ 1071.440956] should_fail.cold+0xa/0xf [ 1071.444774] ? setup_fault_attr+0x200/0x200 [ 1071.449109] ? lock_acquire+0x1ec/0x3c0 [ 1071.453098] __should_failslab+0x115/0x180 [ 1071.457351] should_failslab+0x5/0x10 [ 1071.461193] kmem_cache_alloc_trace+0x284/0x380 [ 1071.465878] alloc_pipe_info+0xb8/0x470 [ 1071.469873] splice_direct_to_actor+0x6dd/0x8d0 [ 1071.474558] ? apparmor_getprocattr+0x11e0/0x11e0 [ 1071.479426] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1071.484292] ? do_splice_to+0x160/0x160 [ 1071.486506] audit: type=1804 audit(1664497979.127:3348): pid=9948 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1087/bus" dev="sda1" ino=13941 res=1 [ 1071.488281] ? security_file_permission+0x1c0/0x220 [ 1071.516707] do_splice_direct+0x1a7/0x270 [ 1071.520865] ? splice_direct_to_actor+0x8d0/0x8d0 [ 1071.525719] ? security_file_permission+0x1c0/0x220 [ 1071.530751] do_sendfile+0x550/0xc30 [ 1071.534486] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1071.539073] ? vfs_write+0x393/0x540 [ 1071.542793] __se_sys_sendfile64+0x147/0x160 [ 1071.547202] ? __se_sys_sendfile+0x180/0x180 [ 1071.551617] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1071.556994] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1071.562022] ? do_syscall_64+0x21/0x620 [ 1071.566003] do_syscall_64+0xf9/0x620 [ 1071.569809] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1071.575008] RIP: 0033:0x7fcd7f6035a9 [ 1071.578819] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1071.597727] RSP: 002b:00007fcd7df56168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1071.605445] RAX: ffffffffffffffda RBX: 00007fcd7f725050 RCX: 00007fcd7f6035a9 [ 1071.612721] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 1071.619993] RBP: 00007fcd7df561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1071.627273] R10: 0000800100020046 R11: 0000000000000246 R12: 0000000000000001 [ 1071.634549] R13: 00007ffcafdeef3f R14: 00007fcd7df56300 R15: 0000000000022000 00:32:59 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x1400000000000) creat(0x0, 0x0) 00:32:59 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:59 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:59 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0}}, './file0/file0\x00'}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, r2, 0x1000) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622013f004a61"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r4, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e000100697036657273028004040010375e40d22884897dfbe5ccc34b7658f2538aa74f4ee8b78f2d572d16e7c8a41856417ab30a70"], 0x3c}}, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x9, @any, 0x6}, 0xe) dup2(r3, r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:59 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:32:59 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 2) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:59 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:32:59 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d976"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1071.848527] audit: type=1804 audit(1664497979.597:3349): pid=9975 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1168/bus" dev="sda1" ino=14674 res=1 [ 1071.873126] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:59 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1071.968585] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:32:59 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1072.021729] FAULT_INJECTION: forcing a failure. [ 1072.021729] name failslab, interval 1, probability 0, space 0, times 0 00:32:59 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d976"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1072.174743] CPU: 1 PID: 9977 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1072.182572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1072.191942] Call Trace: [ 1072.194546] dump_stack+0x1fc/0x2ef [ 1072.198196] should_fail.cold+0xa/0xf [ 1072.202015] ? setup_fault_attr+0x200/0x200 [ 1072.206355] ? __should_failslab+0xdb/0x180 [ 1072.210693] __should_failslab+0x115/0x180 [ 1072.214947] should_failslab+0x5/0x10 [ 1072.218765] __kmalloc+0x2ab/0x3c0 [ 1072.222320] ? alloc_pipe_info+0x193/0x470 [ 1072.226572] alloc_pipe_info+0x193/0x470 [ 1072.230659] splice_direct_to_actor+0x6dd/0x8d0 [ 1072.235341] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1072.240114] ? apparmor_getprocattr+0x11e0/0x11e0 [ 1072.244979] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1072.249840] ? do_splice_to+0x160/0x160 [ 1072.253831] ? security_file_permission+0x1c0/0x220 [ 1072.258882] do_splice_direct+0x1a7/0x270 [ 1072.263043] ? splice_direct_to_actor+0x8d0/0x8d0 [ 1072.267902] ? security_file_permission+0x1c0/0x220 [ 1072.272939] do_sendfile+0x550/0xc30 [ 1072.276675] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1072.281278] ? vfs_write+0x393/0x540 [ 1072.285010] __se_sys_sendfile64+0x147/0x160 [ 1072.289436] ? __se_sys_sendfile+0x180/0x180 [ 1072.293861] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1072.299244] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1072.304275] ? do_syscall_64+0x21/0x620 [ 1072.308289] do_syscall_64+0xf9/0x620 [ 1072.312114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.317313] RIP: 0033:0x7fcd7f6035a9 [ 1072.321034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1072.339943] RSP: 002b:00007fcd7df56168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1072.347663] RAX: ffffffffffffffda RBX: 00007fcd7f725050 RCX: 00007fcd7f6035a9 [ 1072.354945] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 1072.362223] RBP: 00007fcd7df561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1072.369505] R10: 0000800100020046 R11: 0000000000000246 R12: 0000000000000001 [ 1072.376786] R13: 00007ffcafdeef3f R14: 00007fcd7df56300 R15: 0000000000022000 [ 1072.452900] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:33:00 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1072.643596] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:33:00 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x1400000000000) creat(0x0, 0x0) [ 1072.857924] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:33:00 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:33:00 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d976"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1072.940713] FAULT_INJECTION: forcing a failure. [ 1072.940713] name failslab, interval 1, probability 0, space 0, times 0 [ 1073.078627] CPU: 0 PID: 10005 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 1073.086547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1073.095911] Call Trace: [ 1073.098516] dump_stack+0x1fc/0x2ef [ 1073.102164] should_fail.cold+0xa/0xf [ 1073.105979] ? setup_fault_attr+0x200/0x200 [ 1073.110316] ? lock_acquire+0x170/0x3c0 [ 1073.114299] __should_failslab+0x115/0x180 [ 1073.118540] should_failslab+0x5/0x10 [ 1073.122349] kmem_cache_alloc_trace+0x284/0x380 [ 1073.127031] alloc_pipe_info+0xb8/0x470 [ 1073.131018] splice_direct_to_actor+0x6dd/0x8d0 [ 1073.135698] ? apparmor_getprocattr+0x11e0/0x11e0 [ 1073.140558] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1073.145413] ? do_splice_to+0x160/0x160 [ 1073.149391] ? security_file_permission+0x1c0/0x220 [ 1073.154424] do_splice_direct+0x1a7/0x270 [ 1073.158577] ? splice_direct_to_actor+0x8d0/0x8d0 [ 1073.163420] ? security_file_permission+0x1c0/0x220 [ 1073.168443] do_sendfile+0x550/0xc30 [ 1073.172165] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1073.176747] ? vfs_write+0x393/0x540 [ 1073.180464] __se_sys_sendfile64+0x147/0x160 [ 1073.184873] ? __se_sys_sendfile+0x180/0x180 [ 1073.189282] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1073.194643] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1073.199656] ? do_syscall_64+0x21/0x620 [ 1073.203630] do_syscall_64+0xf9/0x620 [ 1073.207431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1073.212615] RIP: 0033:0x7f2b73bf75a9 [ 1073.216327] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1073.235224] RSP: 002b:00007f2b7254a168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1073.242932] RAX: ffffffffffffffda RBX: 00007f2b73d19050 RCX: 00007f2b73bf75a9 [ 1073.250201] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 1073.257466] RBP: 00007f2b7254a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1073.264730] R10: 0000800100020046 R11: 0000000000000246 R12: 0000000000000001 [ 1073.271999] R13: 00007ffdae40413f R14: 00007f2b7254a300 R15: 0000000000022000 00:33:01 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1073.384063] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1073.496195] FAULT_INJECTION: forcing a failure. [ 1073.496195] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1073.580267] CPU: 0 PID: 10022 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1073.588187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1073.597549] Call Trace: [ 1073.600148] dump_stack+0x1fc/0x2ef [ 1073.603787] should_fail.cold+0xa/0xf [ 1073.607596] ? __perf_event_task_sched_in+0x795/0x9b0 [ 1073.612800] ? setup_fault_attr+0x200/0x200 [ 1073.617134] ? mark_held_locks+0xf0/0xf0 [ 1073.621213] ? lock_downgrade+0x720/0x720 [ 1073.625364] ? lock_acquire+0x170/0x3c0 [ 1073.629354] __alloc_pages_nodemask+0x239/0x2890 [ 1073.634128] ? check_preemption_disabled+0x41/0x280 [ 1073.639159] ? finish_task_switch+0x146/0x760 [ 1073.643673] ? mark_held_locks+0xa6/0xf0 [ 1073.647744] ? finish_task_switch+0x118/0x760 [ 1073.652254] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1073.657114] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1073.661717] ? _raw_spin_unlock_irq+0x5a/0x80 [ 1073.666225] ? __schedule+0x88f/0x2040 [ 1073.670119] ? rcu_nmi_exit+0xb3/0x180 [ 1073.674021] ? mark_held_locks+0xa6/0xf0 [ 1073.678091] ? io_schedule_timeout+0x140/0x140 [ 1073.682716] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1073.687499] alloc_pages_current+0x193/0x2a0 [ 1073.691928] skb_page_frag_refill+0x258/0x550 [ 1073.696448] sk_page_frag_refill+0x4a/0x1d0 [ 1073.700784] sk_alloc_sg+0x154/0x850 [ 1073.704517] tls_sw_sendpage+0x4e1/0xd00 [ 1073.708600] ? lock_downgrade+0x720/0x720 [ 1073.712759] ? tls_sw_sendmsg+0x1210/0x1210 [ 1073.717096] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1073.722301] ? tls_sw_sendmsg+0x1210/0x1210 [ 1073.726638] inet_sendpage+0x164/0x650 [ 1073.730540] ? current_time+0x13c/0x1c0 [ 1073.734521] ? inet_accept+0x770/0x770 [ 1073.738410] sock_sendpage+0xdf/0x140 [ 1073.742228] pipe_to_sendpage+0x268/0x330 [ 1073.746383] ? sockfs_setattr+0x160/0x160 [ 1073.750542] ? direct_splice_actor+0x160/0x160 [ 1073.755127] ? splice_from_pipe_next.part.0+0x2ad/0x360 [ 1073.760500] __splice_from_pipe+0x389/0x800 [ 1073.764831] ? direct_splice_actor+0x160/0x160 [ 1073.769417] generic_splice_sendpage+0xd4/0x140 [ 1073.774097] ? __splice_from_pipe+0x800/0x800 [ 1073.778606] ? generic_splice_sendpage+0x7/0x140 [ 1073.783364] ? __splice_from_pipe+0x800/0x800 [ 1073.787877] direct_splice_actor+0x115/0x160 [ 1073.792309] splice_direct_to_actor+0x33f/0x8d0 [ 1073.796994] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1073.801768] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1073.806627] ? do_splice_to+0x160/0x160 [ 1073.810619] do_splice_direct+0x1a7/0x270 [ 1073.814784] ? splice_direct_to_actor+0x8d0/0x8d0 [ 1073.819650] ? security_file_permission+0x1c0/0x220 [ 1073.824693] do_sendfile+0x550/0xc30 [ 1073.828427] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1073.833023] ? vfs_write+0x393/0x540 [ 1073.836751] __se_sys_sendfile64+0x147/0x160 [ 1073.841173] ? __se_sys_sendfile+0x180/0x180 [ 1073.845597] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1073.850975] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1073.855997] ? do_syscall_64+0x21/0x620 [ 1073.859984] do_syscall_64+0xf9/0x620 [ 1073.863799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1073.868996] RIP: 0033:0x7fcd7f6035a9 [ 1073.872716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1073.891626] RSP: 002b:00007fcd7df56168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1073.899342] RAX: ffffffffffffffda RBX: 00007fcd7f725050 RCX: 00007fcd7f6035a9 [ 1073.906616] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 1073.913879] RBP: 00007fcd7df561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1073.921149] R10: 0000800100020046 R11: 0000000000000246 R12: 0000000000000001 00:33:01 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x1400000000000) creat(0x0, 0x0) [ 1073.928414] R13: 00007ffcafdeef3f R14: 00007fcd7df56300 R15: 0000000000022000 00:33:01 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1074.242660] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:33:02 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:33:02 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 2) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:33:02 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:33:02 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d97622"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:33:02 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:33:02 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x1400000000000) creat(0x0, 0x0) [ 1075.196463] kauditd_printk_skb: 12 callbacks suppressed [ 1075.196474] audit: type=1804 audit(1664497982.947:3362): pid=10058 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir382537062/syzkaller.rSJ5UT/1110/bus" dev="sda1" ino=14338 res=1 [ 1075.242494] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1075.258417] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:33:03 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d9762201"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1075.289804] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1075.346559] FAULT_INJECTION: forcing a failure. [ 1075.346559] name failslab, interval 1, probability 0, space 0, times 0 [ 1075.358481] CPU: 1 PID: 10063 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 1075.366392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1075.375757] Call Trace: [ 1075.378366] dump_stack+0x1fc/0x2ef [ 1075.378416] FAULT_INJECTION: forcing a failure. [ 1075.378416] name failslab, interval 1, probability 0, space 0, times 0 [ 1075.382015] should_fail.cold+0xa/0xf [ 1075.382036] ? setup_fault_attr+0x200/0x200 [ 1075.382061] ? lock_acquire+0x170/0x3c0 [ 1075.405337] __should_failslab+0x115/0x180 [ 1075.409586] should_failslab+0x5/0x10 [ 1075.413393] __kmalloc+0x2ab/0x3c0 [ 1075.416945] ? alloc_pipe_info+0x193/0x470 [ 1075.421190] alloc_pipe_info+0x193/0x470 [ 1075.425263] splice_direct_to_actor+0x6dd/0x8d0 [ 1075.429947] ? apparmor_getprocattr+0x11e0/0x11e0 [ 1075.434804] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1075.439655] ? do_splice_to+0x160/0x160 [ 1075.443635] ? security_file_permission+0x1c0/0x220 [ 1075.448666] do_splice_direct+0x1a7/0x270 [ 1075.452826] ? splice_direct_to_actor+0x8d0/0x8d0 [ 1075.457674] ? security_file_permission+0x1c0/0x220 [ 1075.462701] do_sendfile+0x550/0xc30 [ 1075.466428] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1075.471015] ? vfs_write+0x393/0x540 [ 1075.474739] __se_sys_sendfile64+0x147/0x160 [ 1075.479152] ? __se_sys_sendfile+0x180/0x180 [ 1075.483565] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1075.488930] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1075.493946] ? do_syscall_64+0x21/0x620 [ 1075.497927] do_syscall_64+0xf9/0x620 [ 1075.501734] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.506925] RIP: 0033:0x7f2b73bf75a9 [ 1075.510640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1075.529542] RSP: 002b:00007f2b72529168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1075.537251] RAX: ffffffffffffffda RBX: 00007f2b73d19120 RCX: 00007f2b73bf75a9 [ 1075.544524] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 1075.551788] RBP: 00007f2b725291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1075.559059] R10: 0000800100020046 R11: 0000000000000246 R12: 0000000000000001 [ 1075.566324] R13: 00007ffdae40413f R14: 00007f2b72529300 R15: 0000000000022000 [ 1075.579726] audit: type=1804 audit(1664497982.967:3363): pid=10059 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir2307338687/syzkaller.OH2NBm/1120/bus" dev="sda1" ino=15073 res=1 [ 1075.604149] audit: type=1804 audit(1664497983.017:3365): pid=10062 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1202/bus" dev="sda1" ino=15074 res=1 00:33:03 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1075.699331] audit: type=1804 audit(1664497983.027:3366): pid=10061 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1090/bus" dev="sda1" ino=14340 res=1 [ 1075.746151] CPU: 0 PID: 10066 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 1075.754072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1075.763432] Call Trace: [ 1075.766032] dump_stack+0x1fc/0x2ef [ 1075.769682] should_fail.cold+0xa/0xf [ 1075.773497] ? setup_fault_attr+0x200/0x200 [ 1075.777829] ? lock_acquire+0x1ec/0x3c0 [ 1075.781826] __should_failslab+0x115/0x180 [ 1075.786077] should_failslab+0x5/0x10 [ 1075.789893] kmem_cache_alloc_trace+0x284/0x380 [ 1075.794583] alloc_pipe_info+0xb8/0x470 [ 1075.798669] splice_direct_to_actor+0x6dd/0x8d0 [ 1075.803359] ? apparmor_getprocattr+0x11e0/0x11e0 [ 1075.808223] ? check_preemption_disabled+0x41/0x280 [ 1075.813255] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1075.818124] ? do_splice_to+0x160/0x160 [ 1075.822107] ? security_file_permission+0x1c0/0x220 [ 1075.827145] do_splice_direct+0x1a7/0x270 [ 1075.831307] ? splice_direct_to_actor+0x8d0/0x8d0 [ 1075.836155] ? retint_kernel+0x2d/0x2d [ 1075.840074] do_sendfile+0x550/0xc30 [ 1075.843817] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1075.848408] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1075.852999] ? rcu_nmi_exit+0xb3/0x180 [ 1075.856887] __se_sys_sendfile64+0x147/0x160 [ 1075.861316] ? __se_sys_sendfile+0x180/0x180 [ 1075.865732] ? do_syscall_64+0xbf/0x620 [ 1075.869712] do_syscall_64+0xf9/0x620 [ 1075.873529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.878730] RIP: 0033:0x7f59c69585a9 [ 1075.882441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1075.901350] RSP: 002b:00007f59c528a168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1075.909058] RAX: ffffffffffffffda RBX: 00007f59c6a7a120 RCX: 00007f59c69585a9 [ 1075.916325] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 1075.923589] RBP: 00007f59c528a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1075.930853] R10: 0000800100020046 R11: 0000000000000246 R12: 0000000000000001 [ 1075.938119] R13: 00007ffc5c3406af R14: 00007f59c528a300 R15: 0000000000022000 00:33:03 executing program 4: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa881}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2f) sendfile(r2, r1, 0x0, 0x8080ffffffde) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:33:03 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d9762201"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:33:04 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1076.363648] audit: type=1804 audit(1664497983.017:3364): pid=10060 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1171/bus" dev="sda1" ino=14690 res=1 [ 1076.388563] audit: type=1804 audit(1664497983.387:3367): pid=10070 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir2307338687/syzkaller.OH2NBm/1120/bus" dev="sda1" ino=15073 res=1 [ 1076.412670] audit: type=1804 audit(1664497983.497:3368): pid=10058 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir382537062/syzkaller.rSJ5UT/1110/bus" dev="sda1" ino=14338 res=1 [ 1076.437362] audit: type=1804 audit(1664497983.967:3369): pid=10085 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1091/bus" dev="sda1" ino=14340 res=1 00:33:04 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d9762201"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:33:04 executing program 4: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa881}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2f) (async) sendfile(r2, r1, 0x0, 0x8080ffffffde) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) (async) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:33:04 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:33:04 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d9762201"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1076.875768] FAULT_INJECTION: forcing a failure. [ 1076.875768] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1076.876211] audit: type=1804 audit(1664497983.967:3370): pid=10086 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1203/bus" dev="sda1" ino=13940 res=1 [ 1077.011854] CPU: 1 PID: 10103 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 1077.019774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1077.029143] Call Trace: [ 1077.031736] dump_stack+0x1fc/0x2ef [ 1077.035369] should_fail.cold+0xa/0xf [ 1077.039177] ? setup_fault_attr+0x200/0x200 [ 1077.043506] ? crypto_shash_update+0xcc/0x120 [ 1077.048012] __alloc_pages_nodemask+0x239/0x2890 [ 1077.052768] ? ext4_inode_csum+0x676/0x920 [ 1077.057020] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1077.061867] ? mark_held_locks+0xa6/0xf0 [ 1077.065929] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1077.070682] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1077.075272] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1077.080029] ? rcu_nmi_exit+0xb3/0x180 [ 1077.083935] alloc_pages_current+0x193/0x2a0 [ 1077.088342] skb_page_frag_refill+0x258/0x550 [ 1077.092845] sk_page_frag_refill+0x4a/0x1d0 [ 1077.097164] sk_alloc_sg+0x154/0x850 [ 1077.100886] tls_sw_sendpage+0x4e1/0xd00 [ 1077.104959] ? lock_downgrade+0x720/0x720 [ 1077.109113] ? tls_sw_sendmsg+0x1210/0x1210 [ 1077.113434] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1077.118628] ? tls_sw_sendmsg+0x1210/0x1210 [ 1077.122954] inet_sendpage+0x164/0x650 [ 1077.126840] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1077.131426] ? inet_accept+0x770/0x770 [ 1077.135307] sock_sendpage+0xdf/0x140 [ 1077.139116] pipe_to_sendpage+0x268/0x330 [ 1077.143261] ? sockfs_setattr+0x160/0x160 [ 1077.147416] ? direct_splice_actor+0x160/0x160 [ 1077.152000] ? __splice_from_pipe+0x379/0x800 [ 1077.156497] __splice_from_pipe+0x389/0x800 [ 1077.160822] ? direct_splice_actor+0x160/0x160 [ 1077.165406] generic_splice_sendpage+0xd4/0x140 [ 1077.170083] ? __splice_from_pipe+0x800/0x800 [ 1077.174583] ? security_file_permission+0x1c0/0x220 [ 1077.179599] ? __splice_from_pipe+0x800/0x800 [ 1077.184098] direct_splice_actor+0x115/0x160 [ 1077.188514] splice_direct_to_actor+0x33f/0x8d0 [ 1077.193191] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1077.198033] ? do_splice_to+0x160/0x160 [ 1077.202016] do_splice_direct+0x1a7/0x270 [ 1077.206167] ? splice_direct_to_actor+0x8d0/0x8d0 [ 1077.211014] ? security_file_permission+0x1c0/0x220 [ 1077.216037] do_sendfile+0x550/0xc30 [ 1077.219759] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1077.224340] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1077.228925] ? rcu_nmi_exit+0xb3/0x180 [ 1077.232812] __se_sys_sendfile64+0x147/0x160 [ 1077.237222] ? __se_sys_sendfile+0x180/0x180 [ 1077.241637] do_syscall_64+0xf9/0x620 [ 1077.245442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1077.250624] RIP: 0033:0x7f2b73bf75a9 [ 1077.254337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1077.273229] RSP: 002b:00007f2b7254a168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1077.280937] RAX: ffffffffffffffda RBX: 00007f2b73d19050 RCX: 00007f2b73bf75a9 [ 1077.288199] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 1077.295460] RBP: 00007f2b7254a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1077.302727] R10: 0000800100020046 R11: 0000000000000246 R12: 0000000000000001 [ 1077.309989] R13: 00007ffdae40413f R14: 00007f2b7254a300 R15: 0000000000022000 [ 1077.332835] net_ratelimit: 5 callbacks suppressed [ 1077.332846] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1077.385936] audit: type=1804 audit(1664497984.267:3371): pid=10085 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1091/bus" dev="sda1" ino=14340 res=1 00:33:05 executing program 4: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async, rerun: 32) r0 = getpgid(0x0) (rerun: 32) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa881}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x2f) (async) sendfile(r2, r1, 0x0, 0x8080ffffffde) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f100"/22]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:33:05 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d9762201"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:33:05 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:33:05 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d9762201"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1078.187393] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:33:06 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x80010002000f) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:33:06 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d9762201"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:33:06 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x21fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x7) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)=ANY=[]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:33:06 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 4) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="4205f7e6bdd2a49409f10000000000"]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:33:06 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020045) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:33:06 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1078.311648] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:33:06 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d9762201"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1078.469300] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1078.552733] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1078.587756] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1078.608288] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1078.680187] FAULT_INJECTION: forcing a failure. [ 1078.680187] name failslab, interval 1, probability 0, space 0, times 0 00:33:06 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d9762201"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1078.947587] CPU: 0 PID: 10162 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 1078.955509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1078.964868] Call Trace: [ 1078.967467] dump_stack+0x1fc/0x2ef [ 1078.971095] should_fail.cold+0xa/0xf [ 1078.974901] ? setup_fault_attr+0x200/0x200 [ 1078.979225] ? lock_acquire+0x170/0x3c0 [ 1078.983207] __should_failslab+0x115/0x180 [ 1078.987444] should_failslab+0x5/0x10 [ 1078.991239] __kmalloc+0x2ab/0x3c0 [ 1078.994788] ? tls_push_record+0xff/0x1370 [ 1078.999024] tls_push_record+0xff/0x1370 [ 1079.003175] ? sk_alloc_sg+0x5d8/0x850 [ 1079.007076] tls_sw_sendpage+0x8c6/0xd00 [ 1079.011147] ? tls_sw_sendmsg+0x1210/0x1210 [ 1079.015468] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1079.020657] ? tls_sw_sendmsg+0x1210/0x1210 [ 1079.024979] inet_sendpage+0x164/0x650 [ 1079.028864] ? current_time+0x13c/0x1c0 [ 1079.032837] ? inet_accept+0x770/0x770 [ 1079.036721] sock_sendpage+0xdf/0x140 [ 1079.040522] pipe_to_sendpage+0x268/0x330 [ 1079.044665] ? sockfs_setattr+0x160/0x160 [ 1079.048818] ? direct_splice_actor+0x160/0x160 [ 1079.053572] ? splice_from_pipe_next.part.0+0x2ad/0x360 [ 1079.058937] __splice_from_pipe+0x389/0x800 [ 1079.063269] ? direct_splice_actor+0x160/0x160 [ 1079.067851] generic_splice_sendpage+0xd4/0x140 [ 1079.072520] ? __splice_from_pipe+0x800/0x800 [ 1079.077020] ? security_file_permission+0x1c0/0x220 [ 1079.082036] ? __splice_from_pipe+0x800/0x800 [ 1079.086533] direct_splice_actor+0x115/0x160 [ 1079.090943] splice_direct_to_actor+0x33f/0x8d0 [ 1079.095618] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1079.100459] ? do_splice_to+0x160/0x160 [ 1079.104440] do_splice_direct+0x1a7/0x270 [ 1079.108588] ? splice_direct_to_actor+0x8d0/0x8d0 [ 1079.113435] ? security_file_permission+0x1c0/0x220 [ 1079.118456] do_sendfile+0x550/0xc30 [ 1079.122191] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1079.126775] ? vfs_write+0x393/0x540 [ 1079.130492] __se_sys_sendfile64+0x147/0x160 [ 1079.134906] ? __se_sys_sendfile+0x180/0x180 [ 1079.139316] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1079.144688] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1079.149702] ? do_syscall_64+0x21/0x620 [ 1079.153674] do_syscall_64+0xf9/0x620 [ 1079.157481] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1079.162672] RIP: 0033:0x7f2b73bf75a9 [ 1079.166386] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1079.185282] RSP: 002b:00007f2b7254a168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1079.192989] RAX: ffffffffffffffda RBX: 00007f2b73d19050 RCX: 00007f2b73bf75a9 [ 1079.200257] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 1079.207523] RBP: 00007f2b7254a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1079.214787] R10: 0000800100020046 R11: 0000000000000246 R12: 0000000000000001 [ 1079.222048] R13: 00007ffdae40413f R14: 00007f2b7254a300 R15: 0000000000022000 00:33:07 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x21fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x7) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)=ANY=[]) (async) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1079.356286] kasan: CONFIG_KASAN_INLINE enabled 00:33:07 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020047) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1079.402435] kasan: GPF could be caused by NULL-ptr deref or user memory access 00:33:07 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d9762201"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) [ 1079.498069] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1079.504354] CPU: 0 PID: 10162 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 1079.512232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1079.521605] RIP: 0010:scatterwalk_copychunks+0x4db/0x6a0 [ 1079.527062] Code: ff df 80 3c 02 00 0f 85 98 01 00 00 49 8d 44 24 08 4d 89 26 48 89 c2 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 9f 01 00 00 48 b8 00 00 00 00 [ 1079.545965] RSP: 0018:ffff8880aff1f238 EFLAGS: 00010202 [ 1079.551334] RAX: dffffc0000000000 RBX: 000000000000401d RCX: ffffc90007b1f000 [ 1079.558609] RDX: 0000000000000001 RSI: ffffffff83739e63 RDI: 0000000000000007 [ 1079.565884] RBP: 000000000000401d R08: 0000000000000001 R09: 0000000000000000 [ 1079.573161] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 1079.580434] R13: 0000000000001000 R14: ffff8880aff1f2e8 R15: 0000000000000001 [ 1079.587710] FS: 00007f2b7254a700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 1079.595935] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1079.601816] CR2: 0000001b2fc5f000 CR3: 00000000992cd000 CR4: 00000000003406f0 [ 1079.609099] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1079.616412] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1079.623676] Call Trace: [ 1079.626286] scatterwalk_map_and_copy+0x121/0x1a0 [ 1079.631135] ? scatterwalk_ffwd+0x370/0x370 [ 1079.635463] ? aesni_gcm_enc_avx2+0x196/0x1b0 [ 1079.639968] ? kernel_fpu_enable+0x1f/0x40 [ 1079.644288] ? kernel_fpu_end+0x11b/0x170 [ 1079.648436] ? kernel_fpu_enable+0x40/0x40 [ 1079.652682] gcmaes_encrypt.constprop.0+0x89f/0xd90 [ 1079.657710] ? gcmaes_crypt_by_sg.constprop.0+0x1790/0x1790 [ 1079.663410] ? inet_sendpage+0x164/0x650 [ 1079.667456] ? sock_sendpage+0xdf/0x140 [ 1079.671419] ? pipe_to_sendpage+0x268/0x330 [ 1079.675724] ? __splice_from_pipe+0x389/0x800 [ 1079.680206] ? generic_splice_sendpage+0xd4/0x140 [ 1079.685159] ? direct_splice_actor+0x115/0x160 [ 1079.689734] ? splice_direct_to_actor+0x33f/0x8d0 [ 1079.694573] ? do_splice_direct+0x1a7/0x270 [ 1079.698904] ? do_sendfile+0x550/0xc30 [ 1079.702881] ? __se_sys_sendfile64+0x147/0x160 [ 1079.707463] ? do_syscall_64+0xf9/0x620 [ 1079.711433] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1079.716785] ? usleep_range+0x170/0x170 [ 1079.720753] ? sk_stream_wait_memory+0x9da/0xd60 [ 1079.725499] ? generic_gcmaes_encrypt+0x108/0x160 [ 1079.730347] ? generic_gcmaes_encrypt+0x108/0x160 [ 1079.735175] ? helper_rfc4106_encrypt+0x310/0x310 [ 1079.740009] ? gcmaes_wrapper_encrypt+0x157/0x1f0 [ 1079.744840] ? tls_push_record+0x9d7/0x1370 [ 1079.749156] ? tls_sw_sendpage+0x8c6/0xd00 [ 1079.753383] ? tls_sw_sendmsg+0x1210/0x1210 [ 1079.757692] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 1079.762871] ? tls_sw_sendmsg+0x1210/0x1210 [ 1079.767178] ? inet_sendpage+0x164/0x650 [ 1079.771230] ? current_time+0x13c/0x1c0 [ 1079.775194] ? inet_accept+0x770/0x770 [ 1079.779071] ? sock_sendpage+0xdf/0x140 [ 1079.783034] ? pipe_to_sendpage+0x268/0x330 [ 1079.787344] ? sockfs_setattr+0x160/0x160 [ 1079.791480] ? direct_splice_actor+0x160/0x160 [ 1079.796047] ? splice_from_pipe_next.part.0+0x2ad/0x360 [ 1079.801396] ? __splice_from_pipe+0x389/0x800 [ 1079.805882] ? direct_splice_actor+0x160/0x160 [ 1079.810452] ? generic_splice_sendpage+0xd4/0x140 [ 1079.815279] ? __splice_from_pipe+0x800/0x800 [ 1079.819766] ? security_file_permission+0x1c0/0x220 [ 1079.824769] ? __splice_from_pipe+0x800/0x800 [ 1079.829274] ? direct_splice_actor+0x115/0x160 [ 1079.833853] ? splice_direct_to_actor+0x33f/0x8d0 [ 1079.838703] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1079.843542] ? do_splice_to+0x160/0x160 [ 1079.847508] ? do_splice_direct+0x1a7/0x270 [ 1079.851820] ? splice_direct_to_actor+0x8d0/0x8d0 [ 1079.856653] ? security_file_permission+0x1c0/0x220 [ 1079.861658] ? do_sendfile+0x550/0xc30 [ 1079.865534] ? do_compat_pwritev64+0x1b0/0x1b0 [ 1079.870103] ? vfs_write+0x393/0x540 [ 1079.873806] ? __se_sys_sendfile64+0x147/0x160 [ 1079.878374] ? __se_sys_sendfile+0x180/0x180 [ 1079.882774] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1079.888125] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1079.893148] ? do_syscall_64+0x21/0x620 [ 1079.897118] ? do_syscall_64+0xf9/0x620 [ 1079.901097] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1079.906447] Modules linked in: 00:33:07 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020010) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200), 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) 00:33:07 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x21fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x7) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)=ANY=[]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1079.943193] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:33:07 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, r1, 0x1000) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private, @local}, @echo_reply={0x8}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18003f42de8300000000000200e86aa46f1e0000009dd44bf51bfa25d148d9762201"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setxattr$incfs_metadata(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0), &(0x7f0000000540)="404f4b7e944db73abc0a7ce84f2c25e49cbbe150ec0c64613f17a7f415b0eeeafba4320992d454896b9ee43dd5bb79d42bf59dd8c7bf650631d7ac246939ba68e5b0274bc58c5d5f1082835df4bae346474a1d89df46d69349109fb3261791002d27b41ea178ba3abc1fd2bb8b51c2cbff94fd1341086deea7e2128bc85d97f29688f447d440e365233f94af1994bad42ac73397cb5f2772c1da014fa4e172b500d14b6796fcfcba52b986f8c43c4827b02de84ed55a5a2cc836a8b61b0a5f3db583e228cea41adb6a989c57452c2e31a4b80c25", 0xd4, 0x1) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, @any, 0x8e9}, 0xe) connect$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) sendmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000980)='=', 0x1}], 0x1}}], 0x2, 0x20000844) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000398400000400000000b300000000", @ANYRES32, @ANYBLOB="03040000000000001c0012800e00010069703665727370616e00000008000280040012"], 0x3c}}, 0x0) 00:33:07 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020045) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000200)=0x5, 0x1400000000000) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 1080.103324] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1080.132449] ---[ end trace 278f588dc6cfe02a ]--- [ 1080.137611] RIP: 0010:scatterwalk_copychunks+0x4db/0x6a0 [ 1080.151950] Code: ff df 80 3c 02 00 0f 85 98 01 00 00 49 8d 44 24 08 4d 89 26 48 89 c2 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 9f 01 00 00 48 b8 00 00 00 00 [ 1080.210970] kauditd_printk_skb: 23 callbacks suppressed [ 1080.210981] audit: type=1804 audit(1664497987.957:3395): pid=10209 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1096/bus" dev="sda1" ino=15234 res=1 [ 1080.250844] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1080.282516] RSP: 0018:ffff8880aff1f238 EFLAGS: 00010202 [ 1080.375896] RAX: dffffc0000000000 RBX: 000000000000401d RCX: ffffc90007b1f000 [ 1080.421049] audit: type=1804 audit(1664497987.987:3396): pid=10214 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1174/bus" dev="sda1" ino=15202 res=1 [ 1080.455737] RDX: 0000000000000001 RSI: ffffffff83739e63 RDI: 0000000000000007 [ 1080.476680] RBP: 000000000000401d R08: 0000000000000001 R09: 0000000000000000 [ 1080.484093] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 1080.495200] audit: type=1804 audit(1664497988.037:3397): pid=10193 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir2360586625/syzkaller.0bIYfK/1205/bus" dev="sda1" ino=13941 res=1 [ 1080.521376] R13: 0000000000001000 R14: ffff8880aff1f2e8 R15: 0000000000000001 [ 1080.557144] FS: 00007f2b7254a700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 1080.587182] audit: type=1804 audit(1664497988.057:3398): pid=10209 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir1328612009/syzkaller.s7ppH1/1096/bus" dev="sda1" ino=15234 res=1 [ 1080.615597] audit: type=1804 audit(1664497988.147:3399): pid=10219 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir2307338687/syzkaller.OH2NBm/1123/bus" dev="sda1" ino=13940 res=1 [ 1080.654060] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1080.660089] CR2: 0000001b3033a000 CR3: 00000000992cd000 CR4: 00000000003406e0 [ 1080.667484] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1080.677614] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1080.682811] audit: type=1804 audit(1664497988.197:3400): pid=10218 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir3959240404/syzkaller.Ij8cdN/1174/bus" dev="sda1" ino=15202 res=1 [ 1080.701806] Kernel panic - not syncing: Fatal exception [ 1080.713938] Kernel Offset: disabled [ 1080.717553] Rebooting in 86400 seconds..