0), 0x0, 0x40, 0x0, 0x0) 00:46:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') sendto$ax25(r2, &(0x7f0000000180)="1d8867dad34697dc469a7460a580a45dbed2942a1bbb6dbbaa35480736494431d886d7a9f2d48802af1e8b97932d35188465d7066853a3b2ad80ade861e15b07cbea5c022bce752794f044884a20af266647fd617a50bcf433b70ee4306e975fd6d51b067d22505383005bc2216e4d279c296dc8a9dca463d910997ad5", 0x7d, 0x4005, &(0x7f0000000200)={{0x3, @null, 0x7}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) preadv(r2, &(0x7f00000017c0), 0x199, 0x0) setsockopt$CAIFSO_LINK_SELECT(r2, 0x116, 0x7f, &(0x7f0000000080)=0xf3d, 0x4) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000000)={0x0, r0}) syz_open_procfs(0x0, &(0x7f00000000c0)='net/unix\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) 00:46:47 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x1}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r3, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae0dd88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000001440)) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) 00:46:47 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 768.332487] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) 00:46:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) close(r0) 00:46:47 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net\x00') getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000080)=0xc) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) [ 768.500481] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:47 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) 00:46:47 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 768.649770] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:46:47 executing program 3: syz_open_procfs(0x0, &(0x7f0000000140)='net\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x82200, 0x0) getdents(r3, &(0x7f0000000100)=""/35, 0x23) 00:46:47 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 768.772556] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:47 executing program 2: socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_tables_matches\x00') socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') syz_open_procfs(0x0, &(0x7f0000000300)='attr/sockcreate\x00') syz_open_procfs(0x0, &(0x7f00000000c0)='limits\x00') mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$key(0xf, 0x3, 0x2) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r6, 0x0, r6) socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) accept4$alg(r7, 0x0, 0x0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r8, 0x0, r8) socket$alg(0x26, 0x5, 0x0) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) r10 = accept4$alg(r9, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-net\x00', 0x2, 0x0) r11 = creat(&(0x7f0000000300)='./file0\x00', 0x14a) fcntl$dupfd(r2, 0x0, r11) fcntl$dupfd(r10, 0x0, r6) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r4) socket$inet6_tcp(0xa, 0x1, 0x0) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) accept4$alg(r12, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r13, 0x0, r14) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r15, 0x0, r15) socket$inet6_tcp(0xa, 0x1, 0x0) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r16, 0x0, r16) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r17, 0x0, r17) r18 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r18, 0x0, r18) socket$alg(0x26, 0x5, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) r19 = socket$inet_udplite(0x2, 0x2, 0x88) r20 = userfaultfd(0x0) ioctl$UFFDIO_API(r20, 0xc018aa3f, &(0x7f0000000040)) r21 = socket$inet_udplite(0x2, 0x2, 0x88) r22 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r22, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) ioctl$sock_SIOCETHTOOL(r22, 0x8946, &(0x7f0000000140)={'syz_tun\x00', 0x0}) dup2(r21, r22) r23 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'macvlan0\x00', &(0x7f00000002c0)=ANY=[@ANYRES32=r23]}) r24 = dup2(r19, r1) dup3(r24, r20, 0x0) 00:46:47 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 00:46:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) mmap$snddsp_control(&(0x7f0000ffb000/0x2000)=nil, 0x1000, 0x2000000, 0x22012, r1, 0x83000000) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) 00:46:48 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 769.279372] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) r1 = syz_open_pts(r0, 0x40000) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x0, 0x3, 0x2}}, 0x28) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0x1001, r2) r4 = request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000280)='\x00e3\xaa\xf6\xffV,\xf7\xaf0\x8d\x16LR\xbd\t\xd3\xac\t<\xfb\xcb\r\xba\x16\xd3}\xbe\xdf\x91\xd1\x12L_\r', r2) keyctl$describe(0x6, r4, &(0x7f00000001c0)=""/32, 0x20) r5 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r5, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000002ec0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000002f00)) r7 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r7, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r8 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r8, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r9 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r9, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r10 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r10, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r11 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r11, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r12 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r12, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r13 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r13, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r14 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r14, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000680)=ANY=[@ANYBLOB="14608081b02716c77c4340f718afa32d897e3ffb3d3e1f44034d5c2950f94e7481a9ba5d3c273ce5ed2d25ef5716ce7cd0666e00697de1c641a7f6a54d77917bb1a6a32c07f4e803fada5185ba4de35adc3f9eaa7ee161c0453bda0e488789616ceb3e5bfe5bd936f33b5e13a71898133be6", @ANYBLOB="bdb8ee02ce849397c7a0b077aded48420e1309f36942d31cbc4c5c43aae14475326d4e1dc4673219f03c39d94d9a027d7ebc05040dcd1cbffd6e328159b225f6f9b46692ff7b9f2663fbda36b541f714b43b63602cdfbbdbb2762419ef989622d3ce078dfb3b4957e86d61e6b51e7633b381814b6efd28cfb37d7430fba98f5ee86603d9f49d3ed620e837be102f95ca117166bdeebdb01dc01da6c1ea1d869bd242252ce440a82592b6aa468d1b3f6d7179624ec2776152b5c8eb83bbf2d0d5e2cae068e5502535c174c429dbd3a4ff14c0f4", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64, @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRES16=r5, @ANYPTR64, @ANYRES32, @ANYRES64=r7, @ANYBLOB="de2e79f54f59c18821a1786a72c28b747f3af61c943a707121242e03b8ced9bae18e00e59e604b06c34d6c27d872a7b375a359eb216da9d254792cb9ee97cc6cf8d5667551feaf45c934224d61e0ce490e1943a6c853a48fde907efec27c1238cdd4a9064e87f934c9d4dae54439f50459a80b970e2542ca2f4452cc5c751b5c86925cfd56c8107d802a75d4c716af73d5bc469400f6f57af79c124fe59ffde5c4230430eda5889f66b4a0c787db485bfc1b35ac08e8e7862d525a2761c2bd41ec5f9740c73c00cb41d7b92d2c063659828e3ea5eaf068c0f383100479cf17afb4af5741d282e5", @ANYRES16=r8, @ANYRES16=r1], @ANYRESOCT, @ANYRES16, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYBLOB="859f2253cd433d40e80db4568d1f345b70ff5ebd2f83bbd5eac3d96b0066a91790e5217bdcb83c38a1e1d3", @ANYRES16=r0, @ANYRES64=r9, @ANYRESHEX, @ANYPTR64, @ANYRES32=r10, @ANYRES16=r11, @ANYRESOCT=r3, @ANYRESDEC=r12]], @ANYPTR64=&(0x7f0000000580)=ANY=[@ANYPTR64=&(0x7f0000000500)=ANY=[@ANYRES64=r11, @ANYRESHEX=r1, @ANYRESHEX=r7, @ANYRES16=r13, @ANYRES16=r14, @ANYRESHEX=0x0, @ANYPTR64], @ANYRES64, @ANYRES32=r2, @ANYBLOB="281fa5b777003acec77deadd89842c2926d5c7d71fde4f047fec4d2922e61ec3a65dbdd7023b4f6fa3386459ebd32642c03ab1128d49f1f4df9d7e2fcbda4c48c5977e2a149d88e719230e809b7288b48bb5adf219e64ec0ce7e7d4841392c5cb49533991abd91a9e4b694573e801c5887e7a9686b68045ab91dfb402b6d51aa28a5993c71071ac22cf6a00554d27bc38dba07b4015efdbca559f4c018c54a4747739ee1cb251a83ec5e0bec7977f0"]]) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0x0, 0x5, 0x1, 0x9, 0x16, "470485b857bef1c3"}) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000180)=[{}], &(0x7f0000000240)=0x8) [ 769.464627] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:46:48 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:48 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x2de, 0x0, 0x0, 0xffffffffffffff5e) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f00000000c0)=ANY=[@ANYBLOB="e7000000d94f508529d5770c4154bcbb4fd3335674cdd6d7a5d48d01cac9aafb360a995bdf3e75211740b0bbe2174fad7d898288db7bdbe2868cb652c3ac6378ed6106773783b42444c8979992cc99cd4967a4b19a9a12a4ec6bfbc30991699d0ec4ff63144ea1d8ac6aedba96875fedfb1635841f80bb6cd332649c6dddad130cbced54ebdb745bf028930d010000006bcdb3aec6744b9f88899a41358cc4526b4f7c8c9acda7b8b9be7f94b29d5dcfeaa393e9394750305d4c39ebd0e96e977f2351b36ae48d45e6eea57b2aa6aed092a6dbe4abeb629a5f2d506286a12dd20e9b9a4908082d4a911c52"]) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xc4b, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 769.592461] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:48 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) write$nbd(r1, &(0x7f0000000080)={0x67446698, 0x1, 0x4, 0x4, 0x1, "c60936695ae2fd17dadeacb01f1241d1a33fe36a31e837e0695a2247182546885599bc3dfa91676139dd92a7dbed9f03755d958ee9bf7bd794884c75160075e4488c50b0ed90d681a0b10112e0a4d0de6452b3b27ce82e4277a996e2aa539930d5d53b4a6a4b21955ea4b9a69d0914a54de4e96fd4be9a39fb4e9ef81aa920efb978365b68dbd731d27f9fa7eab3e5f6b3dcd8d17b968b165e860630266d2b5f8e5ac4b250a49709cd126bb935"}, 0xbd) 00:46:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:46:48 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 769.736905] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:48 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) open(&(0x7f0000000000)='./file0\x00', 0x200001, 0x0) 00:46:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:46:48 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:48 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8001, 0x2c140) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) [ 769.901145] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:48 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:48 executing program 1 (fault-call:7 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 770.082854] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 770.094533] FAULT_INJECTION: forcing a failure. [ 770.094533] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 770.120185] CPU: 0 PID: 3957 Comm: syz-executor.1 Not tainted 4.14.167-syzkaller #0 [ 770.128023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.137387] Call Trace: [ 770.139992] dump_stack+0x142/0x197 [ 770.143640] should_fail.cold+0x10f/0x159 [ 770.147820] __alloc_pages_nodemask+0x1d6/0x7a0 [ 770.152567] ? __alloc_pages_slowpath+0x2930/0x2930 [ 770.157606] ? trace_hardirqs_on+0x10/0x10 [ 770.161881] alloc_pages_current+0xec/0x1e0 [ 770.166217] skb_page_frag_refill+0x1ef/0x490 [ 770.170730] sk_page_frag_refill+0x53/0x1c0 [ 770.175144] alloc_sg+0x133/0x6f0 [ 770.178620] ? __local_bh_enable_ip+0x99/0x1a0 [ 770.183225] alloc_encrypted_sg+0x8a/0x100 [ 770.187524] ? ipv6_frag_exit+0x40/0x40 [ 770.191512] tls_sw_sendmsg+0x902/0x1020 [ 770.195586] ? selinux_tun_dev_create+0xc0/0xc0 [ 770.200269] ? alloc_encrypted_sg+0x100/0x100 [ 770.204768] ? __fget+0x237/0x370 [ 770.208275] inet_sendmsg+0x122/0x500 [ 770.212081] ? inet_recvmsg+0x500/0x500 [ 770.216063] sock_sendmsg+0xce/0x110 [ 770.219786] SYSC_sendto+0x206/0x310 [ 770.223601] ? SYSC_connect+0x2d0/0x2d0 [ 770.227592] ? lock_downgrade+0x740/0x740 [ 770.231766] ? wait_for_completion+0x420/0x420 [ 770.236361] ? __sb_end_write+0xc1/0x100 [ 770.240435] ? fput+0xd4/0x150 [ 770.243638] ? SyS_write+0x15e/0x230 [ 770.247362] SyS_sendto+0x40/0x50 [ 770.250822] ? SyS_getpeername+0x30/0x30 [ 770.254890] do_syscall_64+0x1e8/0x640 [ 770.258784] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 770.263649] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 770.269102] RIP: 0033:0x45b349 [ 770.272294] RSP: 002b:00007f32a3804c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 770.280008] RAX: ffffffffffffffda RBX: 00007f32a38056d4 RCX: 000000000045b349 [ 770.287282] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000003 [ 770.294556] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 770.301834] R10: 0000000000000040 R11: 0000000000000246 R12: 0000000000000005 [ 770.309113] R13: 00000000000009a9 R14: 00000000004cb1e8 R15: 0000000000000000 00:46:49 executing program 2: seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000000)=0x6) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=@newlink={0x70, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xe009}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MAX_AGE={0x8}, @IFLA_BR_HELLO_TIME={0x8, 0x2, 0x4}]}}}, @IFLA_LINKMODE={0x5, 0x11, 0x1}, @IFLA_PHYS_SWITCH_ID={0x16, 0x24, "4c1ea0fdb568d2af366b6e7d8437f8c3acac"}, @IFLA_CARRIER={0x5, 0x21, 0x3}, @IFLA_IFALIASn={0x4}]}, 0x70}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 00:46:49 executing program 3: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x101100, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) 00:46:49 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:49 executing program 1 (fault-call:7 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:46:49 executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000000), &(0x7f0000000080)=0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net\x00') getdents(r1, &(0x7f0000000040)=""/46, 0x2e) 00:46:49 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 770.616570] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 770.638705] FAULT_INJECTION: forcing a failure. [ 770.638705] name failslab, interval 1, probability 0, space 0, times 0 [ 770.695215] CPU: 1 PID: 3969 Comm: syz-executor.1 Not tainted 4.14.167-syzkaller #0 [ 770.703060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.712434] Call Trace: [ 770.715037] dump_stack+0x142/0x197 [ 770.718682] should_fail.cold+0x10f/0x159 [ 770.722849] should_failslab+0xdb/0x130 [ 770.726838] __kmalloc+0x2f0/0x7a0 [ 770.730394] ? tls_push_record+0x10a/0x1210 [ 770.734731] tls_push_record+0x10a/0x1210 [ 770.738902] tls_sw_sendmsg+0x9e8/0x1020 [ 770.742979] ? selinux_tun_dev_create+0xc0/0xc0 [ 770.747660] ? alloc_encrypted_sg+0x100/0x100 [ 770.752167] ? __fget+0x237/0x370 [ 770.755638] inet_sendmsg+0x122/0x500 [ 770.759442] ? inet_recvmsg+0x500/0x500 [ 770.765770] sock_sendmsg+0xce/0x110 [ 770.769495] SYSC_sendto+0x206/0x310 [ 770.773225] ? SYSC_connect+0x2d0/0x2d0 [ 770.777207] ? lock_downgrade+0x740/0x740 [ 770.781373] ? wait_for_completion+0x420/0x420 [ 770.785963] ? __sb_end_write+0xc1/0x100 [ 770.790053] ? fput+0xd4/0x150 [ 770.793252] ? SyS_write+0x15e/0x230 [ 770.796977] SyS_sendto+0x40/0x50 [ 770.800437] ? SyS_getpeername+0x30/0x30 [ 770.804508] do_syscall_64+0x1e8/0x640 [ 770.808408] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 770.813264] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 770.818458] RIP: 0033:0x45b349 [ 770.821653] RSP: 002b:00007f32a3804c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 770.829373] RAX: ffffffffffffffda RBX: 00007f32a38056d4 RCX: 000000000045b349 [ 770.836766] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000003 00:46:49 executing program 3: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/packet\x00') socket(0x28, 0x3, 0x64) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) 00:46:49 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 770.844053] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 770.851446] R10: 0000000000000040 R11: 0000000000000246 R12: 0000000000000005 [ 770.858730] R13: 00000000000009a9 R14: 00000000004cb1e8 R15: 0000000000000001 00:46:49 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000080)={0x73622a85, 0x100a, 0x2}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="88c6e36b08636b2c00f368002aa891432d0f9116f2d5a1c5658c1eb92674a16f96a8feb5e095bfee7747d89cd901c387d8f235d600befc0b155cd8cbaf3a67e4605ecb9d5c84bd21ed9e64657d5c0e5d3953f8e08520c705595d874d32f3de0f0697e9c6186405cc9320dccb135b54ea537340d9ed6385fcf9dcf70c2ea846fec91fb540523c1109c3f4dbd90748179e294cf8dbbdd7750f9ba0e0bb83e1ada00feb207b4b90b346f4d76afcdaa28ce92b33f5248665e28c04f8a6f505533ebb434de91f29497317af7441c33c3fcfcdb60120b4bae1749e0b52010768"]) 00:46:49 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) mknodat(r3, &(0x7f00000000c0)='./file0\x00', 0x400, 0x5) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="6769023d", @ANYRESHEX=r5, @ANYBLOB=',\x00']) ioctl$TUNSETGROUP(r2, 0x400454ce, r5) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000000)) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) 00:46:49 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 771.022821] gfs2: invalid mount option: ˆÆãkck [ 771.027543] gfs2: can't parse mount arguments 00:46:49 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 771.136770] gfs2: invalid mount option: ˆÆãkck [ 771.152850] gfs2: can't parse mount arguments 00:46:49 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/vlan/vlan1\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) [ 771.182984] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:50 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:50 executing program 1 (fault-call:7 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:46:50 executing program 2: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socket$netlink(0x10, 0x3, 0x15) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) getsockname$l2tp(r2, &(0x7f00000001c0)={0x2, 0x0, @loopback}, &(0x7f0000000200)=0x10) getsockopt$netlink(r1, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = dup2(0xffffffffffffffff, r1) getsockopt$inet6_dccp_buf(r3, 0x21, 0xf, &(0x7f0000000100)=""/156, &(0x7f0000000040)=0x9c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 00:46:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x0, 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="580000000506010400000000000000000300000005000100070000000900030073797a31000000000900030073797a30000000000900030073797a3100000000090002284a797a300000000009000b0073797a3000000000"], 0x58}, 0x1, 0x0, 0x0, 0x20000800}, 0x10) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) [ 771.378321] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 771.397389] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 771.426271] FAULT_INJECTION: forcing a failure. [ 771.426271] name failslab, interval 1, probability 0, space 0, times 0 [ 771.451045] CPU: 1 PID: 4007 Comm: syz-executor.1 Not tainted 4.14.167-syzkaller #0 [ 771.458886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 771.468251] Call Trace: [ 771.470855] dump_stack+0x142/0x197 [ 771.474588] should_fail.cold+0x10f/0x159 [ 771.478750] should_failslab+0xdb/0x130 [ 771.482739] __kmalloc+0x71/0x7a0 [ 771.486391] ? gcmaes_encrypt.constprop.0+0x143/0xb90 [ 771.492824] gcmaes_encrypt.constprop.0+0x143/0xb90 [ 771.497858] ? __lock_is_held+0xb6/0x140 [ 771.501935] ? check_preemption_disabled+0x3c/0x250 [ 771.506970] generic_gcmaes_encrypt+0xf4/0x130 [ 771.511574] ? helper_rfc4106_encrypt+0x320/0x320 [ 771.516425] ? __kmalloc+0x376/0x7a0 [ 771.520155] gcmaes_wrapper_encrypt+0xef/0x150 [ 771.524761] tls_push_record+0x906/0x1210 [ 771.528932] tls_sw_sendmsg+0x9e8/0x1020 [ 771.533009] ? selinux_tun_dev_create+0xc0/0xc0 [ 771.537693] ? alloc_encrypted_sg+0x100/0x100 [ 771.542196] ? __fget+0x237/0x370 [ 771.545662] inet_sendmsg+0x122/0x500 [ 771.549473] ? inet_recvmsg+0x500/0x500 [ 771.553463] sock_sendmsg+0xce/0x110 [ 771.557626] SYSC_sendto+0x206/0x310 [ 771.561354] ? SYSC_connect+0x2d0/0x2d0 [ 771.565345] ? lock_downgrade+0x740/0x740 [ 771.569517] ? wait_for_completion+0x420/0x420 [ 771.574117] ? __sb_end_write+0xc1/0x100 [ 771.578190] ? fput+0xd4/0x150 [ 771.581388] ? SyS_write+0x15e/0x230 [ 771.585112] SyS_sendto+0x40/0x50 [ 771.588571] ? SyS_getpeername+0x30/0x30 [ 771.592649] do_syscall_64+0x1e8/0x640 [ 771.596541] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 771.601393] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 771.606586] RIP: 0033:0x45b349 [ 771.609779] RSP: 002b:00007f32a3804c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 771.617545] RAX: ffffffffffffffda RBX: 00007f32a38056d4 RCX: 000000000045b349 00:46:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xda, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f0000000200), &(0x7f0000000240)=0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000140)={0xffff8001, {{0x2, 0x4e22, @broadcast}}}, 0x88) preadv(r2, &(0x7f00000017c0), 0x199, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000000)=0x5, 0x4) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r4, 0x1}, 0x1c}}, 0x0) 00:46:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) poll(&(0x7f0000000000)=[{r0, 0x8}], 0x1, 0x2c) 00:46:50 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 771.624823] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000003 [ 771.632109] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 771.639389] R10: 0000000000000040 R11: 0000000000000246 R12: 0000000000000005 [ 771.646670] R13: 00000000000009a9 R14: 00000000004cb1e8 R15: 0000000000000002 00:46:50 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 771.718328] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000040)="dd0cf36c0f0866b8000000000f23d00f21f866352000000b0f23f8660fdb4ec20f08660fc73126650f01cb81b40000dc76b808008ec8", 0x36}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:50 executing program 3: syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@grpquota='grpquota', 0x8}]}) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x7f, 0x6}, {0x2, 0xb538}]}, 0x14, 0x2) [ 771.819781] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:50 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x81}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4300000010101507003d07000000000000000000", @ANYRES32=0x0, @ANYBLOB="2e8f040000da573e61f9e0f430226ecc01d95ab5631669e801b1034af48ee1125f01e96b1bae937e6fb27be171e9ac43cc8b8693d78825324df67b2337e96e960d53bf49c63ae9b555081c70057d00d2f8cf786437ff3bcfb73fe0ac11da028ef424f9eb7f51af586b36e994b8e2bcdcc3fc63c2f95fff2e047444aec5d6ab2f0122d06bac1356ef54211fa901930bf6dd4b6de9d6d9c075569f66045b02c87f74eb5f6c464ffa286a15eac430001c40baff5df2b1b5b096af549d62bef8c7175cf7b786e7b3bf7181e98ad11c12b0e2e77a34dff6deb1346fb584e4133d1f24910b7710c3f3f949e04bb960af8a53bb7b074a71787092eae7e5b7ca726fc6a7619d61ddfb0458eb2778e154b178373026ef5218105b8f24cd1be465149fc854cdc6f7282fc9bccbdee0fa3285388dcfb5ade48338923430120b1c"], 0x20}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000001600)={&(0x7f0000001500), 0xc, &(0x7f00000015c0)={&(0x7f0000001700)=ANY=[@ANYBLOB="88000000280008002c", @ANYRES32=0x0, @ANYBLOB="0400e0ff0f000500ffff0100080001007462660006000500030100000d00010066715f636f64656c0000000008000100636273000b00010064736d610f1300000c00020005000400fa00060005000009000008000100647272000c00020008000100018000000800010074db3c"], 0x3}, 0x1, 0x0, 0x0, 0x20004040}, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f00000013c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000000)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x5, 0x2}, 0xd8) bind$inet(r6, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) r7 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r7, 0x84, 0x12, 0x0, &(0x7f0000001340)) recvmsg(r6, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000003c0)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0xffffff28, 0x3e8}, 0x0) write$binfmt_elf64(r6, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 00:46:50 executing program 1 (fault-call:7 fault-nth:3): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 771.984006] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 772.018998] selinux_nlmsg_perm: 149 callbacks suppressed 00:46:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x80}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0xfffffffd, 0x5}, 0x0) request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000006c0)='eth0eth1eth0lo,%n\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, 0x0, &(0x7f0000000000)="fd", 0x1) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000000)="fd", 0x1) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, 0x0, &(0x7f0000000000)="fd", 0x1) r3 = add_key$user(&(0x7f0000000700)='user\x00', 0x0, &(0x7f0000002a00)="74ddb44a3e2c61b142cd86635eb0b8431b28e3d96c3211bf2c4c0ce721a1caebd4e0fbc4e6e5956aab77ccf0a1c64a00f294d3074d20ad275f57e26d43ef9a480162e8ea4d613ea90055db47d3e557564ac2546c3bb841ce1fe24293c68dd7842a61c8c211beed36eb4fbe81b8ed3e5f11ef0aad0b30a5293343ca84800e3c678459276f5959b5711bcc4af641e4a0613d7a2dc1eb4a2065b6a38feb7399dbcd942a6af71299ba7e91e40b8f5e416217a72bdf9ba87141350148", 0xba, r2) keyctl$KEYCTL_PKEY_QUERY(0x18, r3, 0x0, &(0x7f00000003c0)='eth1\x00', &(0x7f0000000400)) r4 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_PEER_REMOVE(r7, 0x0, 0x0) sendmsg$TIPC_NL_SOCK_GET(r5, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1020008}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x20000480}, 0x0) fcntl$setpipe(r6, 0x407, 0x0) clock_gettime(0x0, 0x0) write(r6, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ab64}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0) ioctl$TUNDETACHFILTER(r6, 0x401054d6, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r9 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r9, &(0x7f0000000140)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r9, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r11, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r12 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r12, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r13 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r13, 0x10e, 0x5, 0x0, &(0x7f0000000100)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r10, @ANYBLOB=',rootmode=0000000000004000ser_id=\x00\x00\x00', @ANYRESDEC=0x0, @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="1c222bdcda", @ANYRES64=r11, @ANYRESDEC=r8, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES64=r0], @ANYRES16=r12, @ANYRESDEC, @ANYRESDEC=r13], @ANYRESDEC=0x0]) preadv(r10, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) read$FUSE(r10, &(0x7f0000000780), 0x1000) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300)='/dev/nvram\x00', 0x101000, 0x0) [ 772.019045] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4112 sclass=netlink_route_socket pig=4036 comm=syz-executor.3 [ 772.050442] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 772.071103] encrypted_key: insufficient parameters specified [ 772.074576] FAULT_INJECTION: forcing a failure. [ 772.074576] name failslab, interval 1, probability 0, space 0, times 0 [ 772.091268] encrypted_key: insufficient parameters specified [ 772.094816] CPU: 1 PID: 4037 Comm: syz-executor.1 Not tainted 4.14.167-syzkaller #0 [ 772.104913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.114278] Call Trace: [ 772.115783] encrypted_key: insufficient parameters specified [ 772.116985] dump_stack+0x142/0x197 [ 772.117003] should_fail.cold+0x10f/0x159 [ 772.117040] should_failslab+0xdb/0x130 [ 772.134570] kmem_cache_alloc_node+0x287/0x780 [ 772.139220] ? tcp_established_options+0x2c5/0x430 [ 772.144170] __alloc_skb+0x9c/0x500 [ 772.147814] ? skb_trim+0x180/0x180 [ 772.151478] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 772.156601] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 772.161629] sk_stream_alloc_skb+0xb3/0x780 [ 772.165962] ? tcp_send_mss+0xa4/0x2f0 [ 772.169860] ? ipv6_frag_exit+0x40/0x40 [ 772.173846] do_tcp_sendpages+0x7d5/0x1820 [ 772.178089] ? gcmaes_encrypt.constprop.0+0x2f1/0xb90 [ 772.183302] ? sk_stream_alloc_skb+0x780/0x780 [ 772.187898] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 772.193127] tls_push_sg+0x1e1/0x740 [ 772.196860] tls_push_record+0xa4a/0x1210 [ 772.201027] tls_sw_sendmsg+0x9e8/0x1020 [ 772.205101] ? selinux_tun_dev_create+0xc0/0xc0 [ 772.209784] ? alloc_encrypted_sg+0x100/0x100 [ 772.214287] ? __fget+0x237/0x370 [ 772.217755] inet_sendmsg+0x122/0x500 [ 772.221562] ? inet_recvmsg+0x500/0x500 [ 772.225544] sock_sendmsg+0xce/0x110 [ 772.229271] SYSC_sendto+0x206/0x310 [ 772.232995] ? SYSC_connect+0x2d0/0x2d0 [ 772.237057] ? lock_downgrade+0x740/0x740 [ 772.241265] ? wait_for_completion+0x420/0x420 [ 772.246119] ? __sb_end_write+0xc1/0x100 [ 772.250201] ? fput+0xd4/0x150 [ 772.253400] ? SyS_write+0x15e/0x230 [ 772.257121] SyS_sendto+0x40/0x50 [ 772.260580] ? SyS_getpeername+0x30/0x30 [ 772.264654] do_syscall_64+0x1e8/0x640 [ 772.268548] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 772.273405] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 772.278600] RIP: 0033:0x45b349 [ 772.281790] RSP: 002b:00007f32a3804c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 772.289507] RAX: ffffffffffffffda RBX: 00007f32a38056d4 RCX: 000000000045b349 [ 772.296786] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000003 [ 772.304068] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 772.311371] R10: 0000000000000040 R11: 0000000000000246 R12: 0000000000000005 [ 772.318654] R13: 00000000000009a9 R14: 00000000004cb1e8 R15: 0000000000000003 00:46:51 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="3400000010000507000100000040000000000000", @ANYRES32=0x0, @ANYBLOB="0000f20000000016140012800b000100627201006765007c3a3715a86709d70e682923637c1a25e1e58f0f047bb6930000002076c2af80e1b3f977cf1e5ab48fc13ae6b9d696544efe7c6f8ec570773c2ae408da43bc31451ef8a514fac1d2aee35ba2cde006833bd959bd"], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x0) [ 772.456901] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 772.469369] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 00:46:51 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x29cb5a25, &(0x7f0000000340), 0x0, 0x0, 0xffbe}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r1, &(0x7f00000002c0)={0x1f, 0x8, @any, 0x7f}, 0xe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) open(&(0x7f00000000c0)='./file0\x00', 0x2000, 0x1f4) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$vbi(0x0, 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/88) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)=0x3d) setsockopt$PNPIPE_ENCAP(r2, 0x113, 0x1, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r5, 0x0, &(0x7f0000000400)='y\x00', 0x2, 0x1) 00:46:51 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:51 executing program 1 (fault-call:7 fault-nth:4): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 772.617122] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:51 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 772.659724] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 772.676014] FAULT_INJECTION: forcing a failure. [ 772.676014] name failslab, interval 1, probability 0, space 0, times 0 [ 772.731182] CPU: 1 PID: 4064 Comm: syz-executor.1 Not tainted 4.14.167-syzkaller #0 [ 772.749097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.758468] Call Trace: [ 772.761081] dump_stack+0x142/0x197 [ 772.764726] should_fail.cold+0x10f/0x159 [ 772.768891] should_failslab+0xdb/0x130 [ 772.772877] kmem_cache_alloc_node_trace+0x280/0x770 [ 772.778345] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 772.783815] __kmalloc_node_track_caller+0x3d/0x80 [ 772.788765] __kmalloc_reserve.isra.0+0x40/0xe0 [ 772.793451] __alloc_skb+0xcf/0x500 [ 772.797090] ? skb_trim+0x180/0x180 [ 772.800717] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 772.805827] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 772.810852] sk_stream_alloc_skb+0xb3/0x780 [ 772.815181] ? tcp_send_mss+0xa4/0x2f0 [ 772.819074] ? ipv6_frag_exit+0x40/0x40 [ 772.823147] do_tcp_sendpages+0x7d5/0x1820 [ 772.827421] ? gcmaes_encrypt.constprop.0+0x2f1/0xb90 [ 772.832639] ? sk_stream_alloc_skb+0x780/0x780 [ 772.837241] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 772.842446] tls_push_sg+0x1e1/0x740 [ 772.846184] tls_push_record+0xa4a/0x1210 [ 772.850352] tls_sw_sendmsg+0x9e8/0x1020 [ 772.854438] ? selinux_tun_dev_create+0xc0/0xc0 [ 772.859127] ? alloc_encrypted_sg+0x100/0x100 [ 772.863635] ? __fget+0x237/0x370 [ 772.867103] inet_sendmsg+0x122/0x500 [ 772.870922] ? inet_recvmsg+0x500/0x500 [ 772.874925] sock_sendmsg+0xce/0x110 [ 772.878650] SYSC_sendto+0x206/0x310 [ 772.882369] ? SYSC_connect+0x2d0/0x2d0 [ 772.886354] ? lock_downgrade+0x740/0x740 [ 772.890518] ? wait_for_completion+0x420/0x420 [ 772.895113] ? __sb_end_write+0xc1/0x100 [ 772.899186] ? fput+0xd4/0x150 [ 772.902386] ? SyS_write+0x15e/0x230 [ 772.906111] SyS_sendto+0x40/0x50 [ 772.909570] ? SyS_getpeername+0x30/0x30 [ 772.913640] do_syscall_64+0x1e8/0x640 [ 772.917539] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 772.922409] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 772.927605] RIP: 0033:0x45b349 [ 772.930797] RSP: 002b:00007f32a3804c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 772.938518] RAX: ffffffffffffffda RBX: 00007f32a38056d4 RCX: 000000000045b349 [ 772.945835] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000003 [ 772.953119] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 772.960399] R10: 0000000000000040 R11: 0000000000000246 R12: 0000000000000005 [ 772.967688] R13: 00000000000009a9 R14: 00000000004cb1e8 R15: 0000000000000004 [ 772.987577] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 773.014214] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4112 sclass=netlink_route_socket pig=4036 comm=syz-executor.3 00:46:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x3c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2089}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000040)={0x4, &(0x7f0000000180)=[{@fixed}, {}, {}, {}]}) 00:46:51 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:51 executing program 1 (fault-call:7 fault-nth:5): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:46:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x81}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4300000010101507003d07000000000000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x20}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000001600)={&(0x7f0000001500), 0xc, &(0x7f00000015c0)={&(0x7f0000001700)=ANY=[@ANYBLOB="88000000280008002c", @ANYRES32=0x0, @ANYBLOB="0400e0ff0f000500ffff0100080001007462660006000500030100000d00010066715f636f64656c0000000008000100636273000b00010064736d610f1300000c00020005000400fa00060005000009000008000100647272000c00020008000100018000000800010074db3c"], 0x3}, 0x1, 0x0, 0x0, 0x20004040}, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f00000013c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffdfb, 0x0, 0x0, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000000)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x5, 0x2}, 0xd8) bind$inet(r6, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) r7 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r7, 0x84, 0x12, 0x0, &(0x7f0000001340)) recvmsg(r6, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000003c0)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0xffffff28, 0x3e8}, 0x0) write$binfmt_elf64(r6, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 773.138608] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 773.148940] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4112 sclass=netlink_route_socket pig=4078 comm=syz-executor.3 [ 773.175505] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 773.196543] FAULT_INJECTION: forcing a failure. [ 773.196543] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 773.208391] CPU: 0 PID: 4077 Comm: syz-executor.1 Not tainted 4.14.167-syzkaller #0 [ 773.216196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 773.225564] Call Trace: [ 773.228168] dump_stack+0x142/0x197 [ 773.231811] should_fail.cold+0x10f/0x159 [ 773.235977] __alloc_pages_nodemask+0x1d6/0x7a0 [ 773.240666] ? __alloc_pages_slowpath+0x2930/0x2930 [ 773.245706] cache_grow_begin+0x80/0x400 [ 773.249777] kmem_cache_alloc_node_trace+0x697/0x770 [ 773.254899] __kmalloc_node_track_caller+0x3d/0x80 [ 773.259839] __kmalloc_reserve.isra.0+0x40/0xe0 [ 773.264523] __alloc_skb+0xcf/0x500 [ 773.268159] ? skb_trim+0x180/0x180 [ 773.271797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 773.276915] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 773.282052] sk_stream_alloc_skb+0xb3/0x780 [ 773.286383] ? tcp_send_mss+0xa4/0x2f0 [ 773.290288] ? ipv6_frag_exit+0x40/0x40 [ 773.294277] do_tcp_sendpages+0x7d5/0x1820 [ 773.298524] ? gcmaes_encrypt.constprop.0+0x2f1/0xb90 [ 773.303741] ? sk_stream_alloc_skb+0x780/0x780 [ 773.308340] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 773.313561] tls_push_sg+0x1e1/0x740 [ 773.317295] tls_push_record+0xa4a/0x1210 [ 773.321465] tls_sw_sendmsg+0x9e8/0x1020 [ 773.325564] ? selinux_tun_dev_create+0xc0/0xc0 [ 773.330256] ? alloc_encrypted_sg+0x100/0x100 [ 773.334764] ? __fget+0x237/0x370 [ 773.338234] inet_sendmsg+0x122/0x500 [ 773.342046] ? inet_recvmsg+0x500/0x500 [ 773.346032] sock_sendmsg+0xce/0x110 [ 773.349759] SYSC_sendto+0x206/0x310 [ 773.353481] ? SYSC_connect+0x2d0/0x2d0 [ 773.357467] ? lock_downgrade+0x740/0x740 [ 773.361638] ? wait_for_completion+0x420/0x420 [ 773.366226] ? __sb_end_write+0xc1/0x100 [ 773.370296] ? fput+0xd4/0x150 [ 773.373499] ? SyS_write+0x15e/0x230 [ 773.378009] SyS_sendto+0x40/0x50 [ 773.381472] ? SyS_getpeername+0x30/0x30 [ 773.385582] do_syscall_64+0x1e8/0x640 [ 773.389475] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 773.394330] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 773.399522] RIP: 0033:0x45b349 [ 773.402718] RSP: 002b:00007f32a3804c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 773.410435] RAX: ffffffffffffffda RBX: 00007f32a38056d4 RCX: 000000000045b349 [ 773.417711] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000003 [ 773.424989] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 773.432266] R10: 0000000000000040 R11: 0000000000000246 R12: 0000000000000005 [ 773.439543] R13: 00000000000009a9 R14: 00000000004cb1e8 R15: 0000000000000005 00:46:52 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:52 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r2, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f00000011c0)=[{0x0}], 0x1}}], 0x1, 0x2000004) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f79399a169a7715919be87aeaa6f8a2a4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000036c0), 0x12) shutdown(0xffffffffffffffff, 0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r4, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="38010000100013070000000000000000ac1414bb000000000000000000000000fe8000"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x138}}, 0x0) r6 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r6, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r6, 0x29, 0x2c, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=ANY=[@ANYBLOB="38010000100013070000000000000000ac1414bb000000000000000000000000fe8000"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020001000000000043320000480001006d643500"/240], 0x138}}, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000740)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev, 0x4e22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, {@in6=@empty, 0x0, 0x33}, @in6=@remote, {}, {}, {}, 0x0, 0x0, 0x2, 0x2}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) r9 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r9, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r9, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r9, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6=@empty, 0x0, 0x33}, @in6=@remote, {}, {}, {}, 0x0, 0x0, 0x2, 0x1}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r11, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6=@empty, 0x0, 0x33}, @in6=@remote, {}, {}, {}, 0x0, 0x0, 0x2, 0x1}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) r12 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r12, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6=@empty, 0x0, 0x33}, @in6=@remote, {}, {}, {}, 0x0, 0x0, 0x2, 0x1}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000380)=ANY=[@ANYRESOCT=r5, @ANYBLOB="c0588dd03fdcd1b17e5e2f2800000000000000006ae4e4903e1e0905bf335c8cf873cc1c2783194a13a6a6092b7c8f1723bdf3c7cf667435381815794be824ac1837ad2abf9f33e0f8bb2c0f2ab14ff9bbe34d8c3deb0bca7dc4bab94a914d", @ANYPTR=&(0x7f0000000700)=ANY=[@ANYRES32=r0, @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYRES16=r1], @ANYRESDEC, @ANYRESOCT=r4], @ANYPTR=&(0x7f00000008c0)=ANY=[@ANYPTR64=&(0x7f0000000880)=ANY=[@ANYRES16=r10, @ANYRESHEX], @ANYRES32=0x0, @ANYRES32=r11, @ANYRES16=r12, @ANYRESOCT, @ANYRESDEC=0x0, @ANYRES32=0x0], @ANYRESHEX=r7, @ANYRESDEC], 0x6}, 0x1, 0x0, 0x0, 0x4048814}, 0x1c800) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r4) r13 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r13, r13) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 00:46:52 executing program 1 (fault-call:7 fault-nth:6): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 773.561392] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:52 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 773.618253] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 773.638757] FAULT_INJECTION: forcing a failure. [ 773.638757] name failslab, interval 1, probability 0, space 0, times 0 [ 773.668879] CPU: 0 PID: 4087 Comm: syz-executor.1 Not tainted 4.14.167-syzkaller #0 [ 773.676722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 773.686085] Call Trace: [ 773.688687] dump_stack+0x142/0x197 [ 773.692330] should_fail.cold+0x10f/0x159 [ 773.696499] should_failslab+0xdb/0x130 [ 773.700492] kmem_cache_alloc_node_trace+0x280/0x770 [ 773.705657] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 773.711119] __kmalloc_node_track_caller+0x3d/0x80 [ 773.716060] __kmalloc_reserve.isra.0+0x40/0xe0 [ 773.720745] __alloc_skb+0xcf/0x500 [ 773.724383] ? skb_trim+0x180/0x180 [ 773.728029] sk_stream_alloc_skb+0xb3/0x780 [ 773.732359] tcp_write_xmit+0x1b53/0x4a20 [ 773.736517] ? memset+0x32/0x40 [ 773.739890] ? amd_decode_mce.cold+0xa2a/0x1801 [ 773.744575] tcp_push_one+0xc1/0xf0 [ 773.748210] do_tcp_sendpages+0xe70/0x1820 [ 773.752462] ? gcmaes_encrypt.constprop.0+0x2f1/0xb90 [ 773.757673] ? sk_stream_alloc_skb+0x780/0x780 [ 773.762268] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 773.762299] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 773.767585] tls_push_sg+0x1e1/0x740 [ 773.767608] tls_push_record+0xa4a/0x1210 [ 773.767632] tls_sw_sendmsg+0x9e8/0x1020 [ 773.789898] ? selinux_tun_dev_create+0xc0/0xc0 [ 773.794591] ? alloc_encrypted_sg+0x100/0x100 [ 773.799102] ? __fget+0x237/0x370 [ 773.802572] inet_sendmsg+0x122/0x500 [ 773.806381] ? inet_recvmsg+0x500/0x500 [ 773.810367] sock_sendmsg+0xce/0x110 [ 773.814095] SYSC_sendto+0x206/0x310 [ 773.817905] ? SYSC_connect+0x2d0/0x2d0 [ 773.821892] ? lock_downgrade+0x740/0x740 [ 773.826060] ? wait_for_completion+0x420/0x420 [ 773.830647] ? __sb_end_write+0xc1/0x100 [ 773.834717] ? fput+0xd4/0x150 [ 773.837914] ? SyS_write+0x15e/0x230 [ 773.841636] SyS_sendto+0x40/0x50 [ 773.845093] ? SyS_getpeername+0x30/0x30 [ 773.849162] do_syscall_64+0x1e8/0x640 [ 773.853057] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 773.857915] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 773.863109] RIP: 0033:0x45b349 00:46:52 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 773.866295] RSP: 002b:00007f32a3804c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 773.874015] RAX: ffffffffffffffda RBX: 00007f32a38056d4 RCX: 000000000045b349 [ 773.881291] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000003 [ 773.888571] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 773.895852] R10: 0000000000000040 R11: 0000000000000246 R12: 0000000000000005 [ 773.903133] R13: 00000000000009a9 R14: 00000000004cb1e8 R15: 0000000000000006 [ 773.983610] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:52 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 774.099847] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 00:46:52 executing program 1 (fault-call:7 fault-nth:7): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:46:52 executing program 3: socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYRES16=0x0, @ANYBLOB="10aa61f19dd3dbb0edf67364a71df9355a659b7bf1eaa1bed00f0a4da72d81343c2c334cd6e9869e"], 0x2}}, 0x651d5ab5d514c246) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0xfffffffd}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0xfa634958e7e38cad}, 0x0) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) io_setup(0x3ff, &(0x7f0000000280)=0x0) io_submit(r1, 0x24, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x20a000, 0x0) io_submit(0x0, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000001c0)}]) open_by_handle_at(r3, &(0x7f0000000200)={0x35, 0x9, "1fe10fdf856bf7711741374908e53a4169753342f72f2f6f9236792f554efeafb3aa15eab6618f6aab6e72593b"}, 0x800) io_getevents(0x0, 0x3, 0x0, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r4, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r5, &(0x7f0000007680)={0x0, 0x5f, &(0x7f0000000140)={&(0x7f00000075c0)={0x1c, r6, 0xb631c6b8429a7eb, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r4, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, r6, 0x8, 0x70bd27, 0x100, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xffffffff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48000}, 0x20004080) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x10001, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r7, 0xc0105303, &(0x7f0000000240)={0x4}) socket$inet(0x10, 0x2, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)='\b') r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xf17) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r9, 0x84, 0x4, &(0x7f0000000180)=0x2, 0x4) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) unshare(0x40040400) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x300, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 774.172507] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 774.228544] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 774.252603] FAULT_INJECTION: forcing a failure. [ 774.252603] name failslab, interval 1, probability 0, space 0, times 0 [ 774.264426] CPU: 0 PID: 4104 Comm: syz-executor.1 Not tainted 4.14.167-syzkaller #0 [ 774.272235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.281710] Call Trace: [ 774.284314] dump_stack+0x142/0x197 [ 774.287964] should_fail.cold+0x10f/0x159 [ 774.292128] should_failslab+0xdb/0x130 [ 774.296105] kmem_cache_alloc+0x47/0x780 [ 774.300172] ? lock_acquire+0x16f/0x430 [ 774.304145] ? check_preemption_disabled+0x3c/0x250 [ 774.309170] skb_clone+0x129/0x320 [ 774.312716] dev_queue_xmit_nit+0x2da/0x940 [ 774.317044] dev_hard_start_xmit+0xa7/0x8b0 [ 774.321376] ? assoc_array_gc+0x1120/0x11d0 [ 774.325714] __dev_queue_xmit+0x1d95/0x25e0 [ 774.330053] ? netdev_pick_tx+0x300/0x300 [ 774.334210] ? find_held_lock+0x35/0x130 [ 774.338282] ? ip6_finish_output+0x4f4/0xb50 [ 774.342705] ? mark_held_locks+0xb1/0x100 [ 774.349238] dev_queue_xmit+0x18/0x20 [ 774.353045] ? dev_queue_xmit+0x18/0x20 [ 774.357032] ip6_finish_output2+0x10c9/0x21b0 [ 774.361568] ? ip6_forward_finish+0x480/0x480 [ 774.366075] ? __lock_is_held+0xb6/0x140 [ 774.370146] ? check_preemption_disabled+0x3c/0x250 [ 774.375179] ip6_finish_output+0x4f4/0xb50 [ 774.379419] ? ip6_finish_output+0x4f4/0xb50 [ 774.383837] ip6_output+0x20f/0x6d0 [ 774.387476] ? ip6_finish_output+0xb50/0xb50 [ 774.391893] ? __lock_is_held+0xb6/0x140 [ 774.395959] ? check_preemption_disabled+0x3c/0x250 [ 774.401014] ? ip6_fragment+0x32c0/0x32c0 [ 774.405171] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 774.410628] ip6_xmit+0xd4c/0x1ea0 [ 774.414197] ? ip6_finish_output2+0x21b0/0x21b0 [ 774.418878] ? save_trace+0x290/0x290 [ 774.422683] ? ip6_append_data+0x2f0/0x2f0 [ 774.426924] ? __lock_is_held+0xb6/0x140 [ 774.431000] ? check_preemption_disabled+0x3c/0x250 [ 774.436139] inet6_csk_xmit+0x286/0x4d0 [ 774.440125] ? inet6_csk_update_pmtu+0x150/0x150 [ 774.444895] ? tcp_md5_do_lookup+0x1d3/0x530 [ 774.449326] __tcp_transmit_skb+0x1721/0x2fd0 [ 774.453837] ? bictcp_cong_avoid+0xe50/0xe50 [ 774.458252] ? __tcp_select_window+0x6e0/0x6e0 [ 774.462843] ? tcp_small_queue_check+0x184/0x1e0 [ 774.467610] tcp_write_xmit+0x575/0x4a20 [ 774.471678] ? memset+0x32/0x40 [ 774.474986] tcp_push_one+0xc1/0xf0 [ 774.478620] do_tcp_sendpages+0xe70/0x1820 [ 774.482867] ? gcmaes_encrypt.constprop.0+0x2f1/0xb90 [ 774.488083] ? sk_stream_alloc_skb+0x780/0x780 [ 774.492766] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 774.497974] tls_push_sg+0x1e1/0x740 [ 774.501707] tls_push_record+0xa4a/0x1210 [ 774.505876] tls_sw_sendmsg+0x9e8/0x1020 [ 774.509953] ? selinux_tun_dev_create+0xc0/0xc0 [ 774.514655] ? alloc_encrypted_sg+0x100/0x100 [ 774.519166] ? __fget+0x237/0x370 [ 774.522638] inet_sendmsg+0x122/0x500 [ 774.526448] ? inet_recvmsg+0x500/0x500 [ 774.530436] sock_sendmsg+0xce/0x110 [ 774.534161] SYSC_sendto+0x206/0x310 [ 774.537883] ? SYSC_connect+0x2d0/0x2d0 [ 774.541870] ? lock_downgrade+0x740/0x740 [ 774.546037] ? wait_for_completion+0x420/0x420 [ 774.550627] ? __sb_end_write+0xc1/0x100 [ 774.554696] ? fput+0xd4/0x150 [ 774.557895] ? SyS_write+0x15e/0x230 [ 774.561617] SyS_sendto+0x40/0x50 [ 774.565108] ? SyS_getpeername+0x30/0x30 [ 774.569206] do_syscall_64+0x1e8/0x640 [ 774.573101] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 774.577961] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 774.583155] RIP: 0033:0x45b349 [ 774.586364] RSP: 002b:00007f32a3804c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 774.594081] RAX: ffffffffffffffda RBX: 00007f32a38056d4 RCX: 000000000045b349 [ 774.601442] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000003 [ 774.608720] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 774.615996] R10: 0000000000000040 R11: 0000000000000246 R12: 0000000000000005 [ 774.623269] R13: 00000000000009a9 R14: 00000000004cb1e8 R15: 0000000000000007 00:46:53 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:53 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 774.697476] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:53 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 774.774075] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 774.828109] IPVS: ftp: loaded support on port[0] = 21 00:46:53 executing program 1 (fault-call:7 fault-nth:8): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 774.853754] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 774.925504] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 774.937625] FAULT_INJECTION: forcing a failure. [ 774.937625] name failslab, interval 1, probability 0, space 0, times 0 [ 774.948982] CPU: 0 PID: 4115 Comm: syz-executor.1 Not tainted 4.14.167-syzkaller #0 [ 774.956791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.966156] Call Trace: [ 774.968761] dump_stack+0x142/0x197 [ 774.972409] should_fail.cold+0x10f/0x159 [ 774.976577] should_failslab+0xdb/0x130 [ 774.980566] kmem_cache_alloc+0x47/0x780 [ 774.984638] ? lock_acquire+0x16f/0x430 [ 774.988616] ? check_preemption_disabled+0x3c/0x250 [ 774.993640] skb_clone+0x129/0x320 [ 774.997189] dev_queue_xmit_nit+0x2da/0x940 [ 775.001520] dev_hard_start_xmit+0xa7/0x8b0 [ 775.005853] ? assoc_array_gc+0x1120/0x11d0 [ 775.010188] __dev_queue_xmit+0x1d95/0x25e0 [ 775.014544] ? netdev_pick_tx+0x300/0x300 [ 775.018704] ? find_held_lock+0x35/0x130 [ 775.022772] ? ip6_finish_output+0x4f4/0xb50 [ 775.027193] ? mark_held_locks+0xb1/0x100 [ 775.031357] dev_queue_xmit+0x18/0x20 [ 775.035161] ? dev_queue_xmit+0x18/0x20 [ 775.039142] ip6_finish_output2+0x10c9/0x21b0 [ 775.043652] ? ip6_forward_finish+0x480/0x480 [ 775.048155] ? __lock_is_held+0xb6/0x140 [ 775.052219] ? check_preemption_disabled+0x3c/0x250 [ 775.057248] ip6_finish_output+0x4f4/0xb50 [ 775.061486] ? ip6_finish_output+0x4f4/0xb50 [ 775.065904] ip6_output+0x20f/0x6d0 [ 775.069541] ? ip6_finish_output+0xb50/0xb50 [ 775.073951] ? __lock_is_held+0xb6/0x140 [ 775.078018] ? check_preemption_disabled+0x3c/0x250 [ 775.083047] ? ip6_fragment+0x32c0/0x32c0 [ 775.087206] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 775.092663] ip6_xmit+0xd4c/0x1ea0 [ 775.096830] ? ip6_finish_output2+0x21b0/0x21b0 [ 775.101509] ? save_trace+0x290/0x290 [ 775.105317] ? ip6_append_data+0x2f0/0x2f0 [ 775.109559] ? __lock_is_held+0xb6/0x140 [ 775.113622] ? check_preemption_disabled+0x3c/0x250 [ 775.118650] inet6_csk_xmit+0x286/0x4d0 [ 775.122634] ? inet6_csk_update_pmtu+0x150/0x150 [ 775.127398] ? tcp_md5_do_lookup+0x1d3/0x530 [ 775.131828] __tcp_transmit_skb+0x1721/0x2fd0 [ 775.136339] ? bictcp_cong_avoid+0xe50/0xe50 [ 775.140755] ? __tcp_select_window+0x6e0/0x6e0 [ 775.145352] ? tcp_small_queue_check+0x184/0x1e0 [ 775.150115] tcp_write_xmit+0x575/0x4a20 [ 775.154184] ? memset+0x32/0x40 [ 775.157477] tcp_push_one+0xc1/0xf0 [ 775.161117] do_tcp_sendpages+0xe70/0x1820 [ 775.165366] ? gcmaes_encrypt.constprop.0+0x2f1/0xb90 [ 775.170582] ? sk_stream_alloc_skb+0x780/0x780 [ 775.175176] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 775.180372] tls_push_sg+0x1e1/0x740 [ 775.184101] tls_push_record+0xa4a/0x1210 [ 775.188278] tls_sw_sendmsg+0x9e8/0x1020 [ 775.192356] ? selinux_tun_dev_create+0xc0/0xc0 [ 775.197037] ? alloc_encrypted_sg+0x100/0x100 [ 775.201537] ? __fget+0x237/0x370 [ 775.205000] inet_sendmsg+0x122/0x500 [ 775.208808] ? inet_recvmsg+0x500/0x500 [ 775.212791] sock_sendmsg+0xce/0x110 [ 775.216519] SYSC_sendto+0x206/0x310 [ 775.220251] ? SYSC_connect+0x2d0/0x2d0 [ 775.224236] ? lock_downgrade+0x740/0x740 [ 775.228405] ? wait_for_completion+0x420/0x420 [ 775.232997] ? __sb_end_write+0xc1/0x100 [ 775.237069] ? fput+0xd4/0x150 [ 775.240265] ? SyS_write+0x15e/0x230 [ 775.243994] SyS_sendto+0x40/0x50 [ 775.247452] ? SyS_getpeername+0x30/0x30 [ 775.251532] do_syscall_64+0x1e8/0x640 [ 775.255424] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 775.260279] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 775.265477] RIP: 0033:0x45b349 [ 775.268673] RSP: 002b:00007f32a3804c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 775.276385] RAX: ffffffffffffffda RBX: 00007f32a38056d4 RCX: 000000000045b349 [ 775.283659] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000003 [ 775.290934] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 775.298209] R10: 0000000000000040 R11: 0000000000000246 R12: 0000000000000005 [ 775.305531] R13: 00000000000009a9 R14: 00000000004cb1e8 R15: 0000000000000008 00:46:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8983, &(0x7f00000002c0)={0x6, 'syzkaller0\x00', {0x4a65db28}, 0x1000}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs$namespace(r4, &(0x7f00000001c0)='ns/ipc\x00') r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x2000, 0x0) ioctl$TIOCMSET(r5, 0x5418, &(0x7f0000000280)=0x66) openat$md(0xffffffffffffff9c, &(0x7f0000000300)='/dev/md0\x00', 0x400000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000140)={[{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video35\x00', 0x2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:56 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:56 executing program 0: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000080)={0x0, 0x80000, r2}) r4 = semget(0x2, 0x3, 0x310) semctl$GETVAL(r4, 0x0, 0xc, &(0x7f0000000580)=""/253) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@gid={'gid', 0x3d, r9}}]}) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f0000000200)={{0x0, r5, 0x0, r7, r9, 0xb1, 0x100}, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000000c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000140)={r3, r10}) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000380)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@upgrade='upgrade'}]}) 00:46:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000140)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:46:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc1751ccce54878a03a35e8602f548c9c685a", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) r2 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000040)={0x9, 0x0, 0x10001, 0x4}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000080)={0x6, r3, 0x30003, 0x2801}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) [ 778.025691] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 778.039406] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:56 executing program 0: bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) gettid() bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) accept$packet(r1, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003cc0)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x17, 0x0, 0x0, 0x0, 0x1, 0x62, &(0x7f0000003d00)=""/98, 0x41100, 0x0, [], r2, 0x15, r0, 0x8, &(0x7f0000000140)={0x0, 0x2}, 0x8, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf086dd1fffffff0e003300630277fbac14140ae0", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) [ 778.079839] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:56 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:56 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x14a00, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:46:56 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) setuid(0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x294c41, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r2, 0x80184153, &(0x7f0000000300)={0x0, &(0x7f0000000200)=[&(0x7f0000000280)="ca4c8ecd579e2381ad77841209990ba2e2fa74b6f0bf4d08e39d624a4e5966ffaf50593c96dcd732db46d8872eeaa74650ff99caf6bd1a690e0d47ab29959194dab2e77f5b7823948c1ac4ffb625586478aedc4f21f67d46555259b589115915bf041aa3", &(0x7f00000003c0)="be4acac616a017fb9749654aef8800d3c1ec44fe30e90faaece35a2aef44f87071905d999b0be2ae34a9764c56e7c4db0ecfb4f4f1b4d51b81b652809aff9e6ddc2d9eb186451ab4312537d677649717a2b017dc555dbf", &(0x7f0000000440)="29ef24b994de04fd93f98cd3b2ef6cc36f8c884e52799d24f37eeab8869633996315d0fab7544697b2d195c7c722f7a71b0896fe4ca8afc8dd0aa119f535d1f39e7ad6583fc2c281", &(0x7f00000004c0)="ec9aee29b6b650e964eaaaed784c4c81d484d0b54940d7ad8a982a9bf52ae9caa1f9488190696931a8632ca5cba179198469c17440a7296489afa8971fe0b9b45f35202c6387b01d23e01a68cf43175527429c3ba6cf7ba15ba1bfcd84ac62ba9aafe3e584bbceec24121e0753b257543c40a79b9a4c298f542eb19263fe52dd6e27fabb3b20ce71c78570cf160f793ad65b180480205b87e6751da35b519565426bc16f4416444e908c2614a0bf"]}) setuid(0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = socket(0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240)=0x202, 0x4000000000dc) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d40)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [], [], [0x400]}, 0x45c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={{}, 0xfa4, 0x2, 0x3}) bind$bt_l2cap(r4, &(0x7f0000000100)={0x1f, 0x8, @none, 0x5}, 0xe) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) [ 778.242400] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 778.244515] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:57 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x40, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 778.328166] audit: type=1400 audit(1579913217.034:476): avc: denied { map } for pid=4136 comm="syz-executor.3" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=169368 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 [ 778.361399] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:57 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, r0, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000b80)={0x0, 0x0, 0x0}, 0x40) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000440), 0x400) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000180)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setuid(0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000002000000e7ff000018030000b0010000b081000000000000b0010000b00100008002000080020000800200008002000080020000030000000000000000000000ffffffffac1e000100000000000000006970366772657461703000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009001b0010000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000020073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d00000000000000000000000000000000000000000006000434c5553544552495000000000000000000000000000000000000000000000000000aaaaaaaaaabb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x378) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x24098080, &(0x7f0000000380)={0xa, 0x4e20, 0x6, @mcast2}, 0x1c) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', 0x88a00, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000400)={0x2, 'syzkaller1\x00', 0x1}, 0x18) r3 = getpid() get_robust_list(r3, &(0x7f0000000100)=0x0, 0x0) msgget$private(0x0, 0x0) 00:46:57 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x40, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 778.385386] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup(r1) sendmsg$NFT_MSG_GETOBJ_RESET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, 0x15, 0xa, 0x301, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x5}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0xc085fa06908f23ff}, 0x2404c014) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 778.552797] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:57 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x40, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 778.614026] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 778.692989] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:57 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) setuid(0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x294c41, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r2, 0x80184153, &(0x7f0000000300)={0x0, &(0x7f0000000200)=[&(0x7f0000000280)="ca4c8ecd579e2381ad77841209990ba2e2fa74b6f0bf4d08e39d624a4e5966ffaf50593c96dcd732db46d8872eeaa74650ff99caf6bd1a690e0d47ab29959194dab2e77f5b7823948c1ac4ffb625586478aedc4f21f67d46555259b589115915bf041aa3", &(0x7f00000003c0)="be4acac616a017fb9749654aef8800d3c1ec44fe30e90faaece35a2aef44f87071905d999b0be2ae34a9764c56e7c4db0ecfb4f4f1b4d51b81b652809aff9e6ddc2d9eb186451ab4312537d677649717a2b017dc555dbf", &(0x7f0000000440)="29ef24b994de04fd93f98cd3b2ef6cc36f8c884e52799d24f37eeab8869633996315d0fab7544697b2d195c7c722f7a71b0896fe4ca8afc8dd0aa119f535d1f39e7ad6583fc2c281", &(0x7f00000004c0)="ec9aee29b6b650e964eaaaed784c4c81d484d0b54940d7ad8a982a9bf52ae9caa1f9488190696931a8632ca5cba179198469c17440a7296489afa8971fe0b9b45f35202c6387b01d23e01a68cf43175527429c3ba6cf7ba15ba1bfcd84ac62ba9aafe3e584bbceec24121e0753b257543c40a79b9a4c298f542eb19263fe52dd6e27fabb3b20ce71c78570cf160f793ad65b180480205b87e6751da35b519565426bc16f4416444e908c2614a0bf"]}) setuid(0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = socket(0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240)=0x202, 0x4000000000dc) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d40)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [], [], [0x400]}, 0x45c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={{}, 0xfa4, 0x2, 0x3}) bind$bt_l2cap(r4, &(0x7f0000000100)={0x1f, 0x8, @none, 0x5}, 0xe) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) [ 778.745650] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) fcntl$setstatus(r2, 0x4, 0x2400) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) getsockname$l2tp(r5, &(0x7f00000001c0)={0x2, 0x0, @initdev}, &(0x7f0000000200)=0x10) preadv(r4, &(0x7f00000017c0), 0x199, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) bind$packet(r2, &(0x7f0000000040)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000002c0)=0x596, 0x4) sendmmsg(r2, &(0x7f0000000d00), 0x400004e, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140), &(0x7f0000000180)=0x4) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:46:57 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 778.864465] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 778.895105] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:57 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 779.036490] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:57 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 779.162271] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:57 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000300)={{0x0, 0x0, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x8c, 0x9, 0x1, 0x9, 0x7, 0x40}, {}, {}, {}, {0x2000}, 0x40000000, 0x0, 0x4, 0x520511, 0xa}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}, &(0x7f0000000180)=0x10) 00:46:57 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 779.295329] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:58 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 779.416372] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:58 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, &(0x7f0000000180)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r0}, 0xc) r1 = perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x8) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) r4 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8e\x00'/15, 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r5 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r5, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r5) sendfile(r2, r3, 0x0, 0x102000004) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup(0xffffffffffffffff) 00:46:58 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000080)) syz_open_pts(r2, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r2, 0x541c, &(0x7f0000000140)) socketpair(0x2, 0x80000, 0x73, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ax25_SIOCDELRT(r3, 0x890c, 0xfffffffffffffffe) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 779.585192] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:58 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 779.669690] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 779.748072] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 779.789003] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:58 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 779.880289] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:58 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 780.026316] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:58 executing program 5 (fault-call:13 fault-nth:0): fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 780.198498] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 780.215196] FAULT_INJECTION: forcing a failure. [ 780.215196] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 780.239309] CPU: 1 PID: 4201 Comm: syz-executor.5 Not tainted 4.14.167-syzkaller #0 [ 780.247144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 780.256503] Call Trace: [ 780.259108] dump_stack+0x142/0x197 [ 780.262758] should_fail.cold+0x10f/0x159 [ 780.266899] __alloc_pages_nodemask+0x1d6/0x7a0 [ 780.271558] ? __alloc_pages_slowpath+0x2930/0x2930 [ 780.276568] ? trace_hardirqs_on+0x10/0x10 [ 780.280793] alloc_pages_current+0xec/0x1e0 [ 780.285112] skb_page_frag_refill+0x1ef/0x490 [ 780.289614] sk_page_frag_refill+0x53/0x1c0 [ 780.293934] alloc_sg+0x133/0x6f0 [ 780.297376] ? __local_bh_enable_ip+0x99/0x1a0 [ 780.301949] alloc_encrypted_sg+0x8a/0x100 [ 780.306167] ? ipv6_frag_exit+0x40/0x40 [ 780.310126] tls_sw_sendmsg+0x902/0x1020 [ 780.314174] ? selinux_tun_dev_create+0xc0/0xc0 [ 780.318831] ? alloc_encrypted_sg+0x100/0x100 [ 780.323312] ? __fget+0x237/0x370 [ 780.326753] inet_sendmsg+0x122/0x500 [ 780.330536] ? inet_recvmsg+0x500/0x500 [ 780.334495] sock_sendmsg+0xce/0x110 [ 780.338194] SYSC_sendto+0x206/0x310 [ 780.341892] ? SYSC_connect+0x2d0/0x2d0 [ 780.345847] ? lock_downgrade+0x740/0x740 [ 780.349989] ? wait_for_completion+0x420/0x420 [ 780.354581] ? __sb_end_write+0xc1/0x100 [ 780.358626] ? fput+0xd4/0x150 [ 780.361821] ? SyS_write+0x15e/0x230 [ 780.365543] SyS_sendto+0x40/0x50 [ 780.368979] ? SyS_getpeername+0x30/0x30 [ 780.373027] do_syscall_64+0x1e8/0x640 [ 780.376906] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 780.381737] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 780.386938] RIP: 0033:0x45b349 [ 780.390118] RSP: 002b:00007fdb187c4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 780.397825] RAX: ffffffffffffffda RBX: 00007fdb187c56d4 RCX: 000000000045b349 [ 780.405081] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000003 [ 780.412334] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 780.419590] R10: 0000000000000040 R11: 0000000000000246 R12: 0000000000000005 [ 780.426848] R13: 00000000000009a9 R14: 00000000004cb1e8 R15: 0000000000000000 00:46:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x21) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) write$binfmt_elf64(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x4e1) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0101000000000000000001000000440001000c00070000000000960000000c0006006c626c637200000008000b000a69700008000800000000000800090000000000080001000a0000000800050002000000"], 0x58}}, 0x0) sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)={0x1e0, r4, 0x10, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x60, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x400}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffff8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x2e}}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfff}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x101}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x18acbd45}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="6eb2dccdd7c67eee9994b4afd870e8a1"}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xab}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x73}, @IPVS_SVC_ATTR_PROTOCOL={0x6}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x34}]}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_batadv\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'tunl0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipvlan1\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1ff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3f}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x4000001}, 0x8000) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = socket$l2tp6(0xa, 0x2, 0x73) r7 = dup(0xffffffffffffffff) ioctl$KVM_SET_CPUID2(r7, 0x4008ae90, &(0x7f0000000540)={0x7, 0x0, [{0x0, 0x687a6488, 0x6, 0x6, 0x18c5, 0x101, 0xa011}, {0x80000000, 0x2, 0x1, 0x0, 0x40, 0x2, 0x3f}, {0x40000000, 0x7fffffff, 0x4, 0x6, 0x42bc, 0x6, 0x401}, {0xc0000000, 0x10001, 0x2, 0xffffff01, 0x10001, 0xfffffffd, 0x2be5}, {0x80000001, 0x8a8, 0x1, 0x4, 0x2, 0x1, 0x3}, {0xc0000001, 0xfffffffe, 0x4, 0x38, 0x710, 0x20, 0xe}, {0xc0000001, 0x5, 0x3, 0x2, 0x1000, 0xfff, 0x10}]}) flock(r0, 0x8) sendto$inet6(r6, &(0x7f0000000080)="39a110", 0x3, 0x4000010, 0x0, 0x0) 00:46:59 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, &(0x7f0000000180)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r0}, 0xc) r1 = perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x8) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) r4 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8e\x00'/15, 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r5 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r5, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r5) sendfile(r2, r3, 0x0, 0x102000004) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup(0xffffffffffffffff) [ 780.536261] syz-executor.3 (4181) used greatest stack depth: 22688 bytes left [ 780.567551] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 780.617635] IPVS: persistence engine module ip_vs_pe_ [ 780.617635] ip not found [ 780.636815] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 780.655592] IPVS: persistence engine module ip_vs_pe_ [ 780.655592] ip not found 00:46:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/71) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 780.725024] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 780.760699] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x41}}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:46:59 executing program 5 (fault-call:13 fault-nth:1): fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:46:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000014c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) bind$netlink(r3, &(0x7f0000001400)={0x10, 0x0, 0x25dfdbfe, 0x2000000}, 0xc) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendto$x25(r2, &(0x7f00000012c0)="880f3fa29228be1555ad31ff1172c9380a68adead3e565c5be838dfca8d03815061dc6e1b4966e73a1f3aa401e7039d8cfc4f921b1c1853a437f5a1a53a6777c2b16c9ceb250723b36a87627bf68b61afb17d4edbe1b2f5682e1061bc2dae5d8261244367458ad54f5d69a654b2f00d0ee0efde80732ce1717f58161527c6395cbd8ffd5092cca5c4fc043a4853dbe98d797782d55c3c2dd2fdcb5ff9f73dc5505edde25c85fcc392a7895f6608d504c39dee3960b52ae9ebf0128aa59af62a5892e8e888ce19cc9ad6f314567c01f68d464ab15f1500a26d41f3554bca14998dc4a86c7484e799527", 0xe9, 0x40084, &(0x7f00000013c0)={0x9, @remote={[], 0x3}}, 0x12) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000140)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x18}}, 0x80, &(0x7f0000000200)=[{&(0x7f00000001c0)="c0bb32f7f9227b620d4d6ecaa0fd0ae67b2a1ae1501c03fd7f5a357524c267e9ee15086656f945a11f04d084aa22ef5fbf0c1e17cc714cebc8e42d", 0x3b}], 0x1, &(0x7f0000000240)=[{0x1010, 0xffbb7781533cc72a, 0xe8, "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"}], 0x1010}}], 0x1, 0x40080) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:46:59 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0xe, 0x4, 0x0, 0x100000009}, 0x1f) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200882, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) accept4$inet6(r1, 0x0, 0x0, 0x0) fallocate(r1, 0x2, 0x0, 0x3ff) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000080)={0x1f, 0xffff, 0x2}, 0x6) r3 = dup(r2) sendmsg$TIPC_NL_PUBL_GET(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x14}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbbf4}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x8}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)={0x34, r6, 0x1, 0x0, 0x0, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @dev}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_PEER_ADDRESS={0x8, 0x4, @broadcast}, @GTPA_LINK={0x8}]}, 0x34}}, 0x0) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10050410}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="080028bd7000fddbdf250200000008000400e0000001080008000100000008000800000000000800080001e5d89667000500ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x4044011}, 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000640)={@multicast2, @multicast1, 0x0}, &(0x7f0000000680)=0xc) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x36}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r10 = syz_open_dev$rtc(&(0x7f0000000280)='/dev/rtc#\x00', 0x9, 0x0) dup2(r10, r3) sendmsg$GTP_CMD_NEWPDP(r3, &(0x7f0000000780)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x48, r6, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@GTPA_I_TEI={0x8, 0x8, 0x2}, @GTPA_LINK={0x8, 0x1, r7}, @GTPA_TID={0xc, 0x3, 0x3}, @GTPA_PEER_ADDRESS={0x8, 0x4, @remote}, @GTPA_O_TEI={0x8, 0x9, 0x1}, @GTPA_LINK={0x8, 0x1, r9}]}, 0x48}, 0x1, 0x0, 0x0, 0x408c0}, 0x20000000) r11 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) accept4$inet6(r11, 0x0, 0x0, 0x0) fallocate(r11, 0x2, 0x0, 0x3ff) r12 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x2142, 0x0) sendmsg$GTP_CMD_GETPDP(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x401040}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, r6, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r11}, @GTPA_VERSION={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @multicast2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x13}}, @GTPA_O_TEI={0x8}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_O_TEI={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r12}, @GTPA_I_TEI={0x8, 0x8, 0x4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x90}, 0xc000) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r6, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@GTPA_FLOW={0x6, 0x6, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x84) [ 780.982048] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 781.007736] FAULT_INJECTION: forcing a failure. [ 781.007736] name failslab, interval 1, probability 0, space 0, times 0 [ 781.021756] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000140)={0x42b9, 0x0, 0x3015, 0x10000, 0x3f, {0x4, 0x401}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 781.021988] CPU: 1 PID: 4220 Comm: syz-executor.5 Not tainted 4.14.167-syzkaller #0 [ 781.040381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 781.040385] Call Trace: 00:46:59 executing program 5 (fault-call:13 fault-nth:2): fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 781.040404] dump_stack+0x142/0x197 [ 781.040419] should_fail.cold+0x10f/0x159 [ 781.040436] should_failslab+0xdb/0x130 [ 781.040446] __kmalloc+0x2f0/0x7a0 [ 781.040463] ? tls_push_record+0x10a/0x1210 00:46:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @mcast2, 0x4}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace(0x4208, r2) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "88a1feffffff00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 781.040477] tls_push_record+0x10a/0x1210 00:46:59 executing program 5 (fault-call:13 fault-nth:3): fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 781.040501] tls_sw_sendmsg+0x9e8/0x1020 [ 781.040522] ? selinux_tun_dev_create+0xc0/0xc0 [ 781.040542] ? alloc_encrypted_sg+0x100/0x100 00:46:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22, 0xfffffffd, @remote}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r2, 0x408c563e, &(0x7f0000000180)={0x40000, 0xd, 0x34, "52f2c2c02dcd9c6518967225c22cff19eb547d963701820788a5052211fc427fa64bb086b344e16e775955ab2b7d4a88bfe62261a44740ffbcca87af", 0x2a, "81e9a234a21541542276b4bd8da4598da53a5d3b40ba2f3c323928ca8e2b3ecac979fa69ac2b34d342d96f449d6f91f9c0bcd7a964bd7fe0a2034d42", 0xf0}) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e24, 0x401, @mcast1, 0x20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r3, 0x12, 0x2, &(0x7f0000000280)=""/138, &(0x7f0000000340)=0x8a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000240)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ecf1430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 781.040552] ? __fget+0x237/0x370 [ 781.040570] inet_sendmsg+0x122/0x500 [ 781.040580] ? inet_recvmsg+0x500/0x500 00:47:00 executing program 5 (fault-call:13 fault-nth:4): fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 781.040594] sock_sendmsg+0xce/0x110 [ 781.040606] SYSC_sendto+0x206/0x310 [ 781.040619] ? SYSC_connect+0x2d0/0x2d0 [ 781.040633] ? lock_downgrade+0x740/0x740 [ 781.040657] ? wait_for_completion+0x420/0x420 [ 781.040669] ? __sb_end_write+0xc1/0x100 [ 781.040682] ? fput+0xd4/0x150 [ 781.040692] ? SyS_write+0x15e/0x230 [ 781.040705] SyS_sendto+0x40/0x50 [ 781.040714] ? SyS_getpeername+0x30/0x30 [ 781.040728] do_syscall_64+0x1e8/0x640 [ 781.040738] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 781.040755] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 781.040764] RIP: 0033:0x45b349 [ 781.040770] RSP: 002b:00007fdb187c4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 781.040782] RAX: ffffffffffffffda RBX: 00007fdb187c56d4 RCX: 000000000045b349 [ 781.040786] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000003 [ 781.040792] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 781.040797] R10: 0000000000000040 R11: 0000000000000246 R12: 0000000000000005 [ 781.040802] R13: 00000000000009a9 R14: 00000000004cb1e8 R15: 0000000000000001 [ 781.118208] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 781.180125] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 781.183173] FAULT_INJECTION: forcing a failure. [ 781.183173] name failslab, interval 1, probability 0, space 0, times 0 [ 781.183186] CPU: 1 PID: 4233 Comm: syz-executor.5 Not tainted 4.14.167-syzkaller #0 [ 781.183193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 781.183197] Call Trace: [ 781.183213] dump_stack+0x142/0x197 [ 781.183230] should_fail.cold+0x10f/0x159 [ 781.183247] should_failslab+0xdb/0x130 [ 781.183257] __kmalloc+0x71/0x7a0 [ 781.183276] ? gcmaes_encrypt.constprop.0+0x143/0xb90 [ 781.183293] gcmaes_encrypt.constprop.0+0x143/0xb90 [ 781.183312] ? __lock_is_held+0xb6/0x140 [ 781.183326] ? check_preemption_disabled+0x3c/0x250 [ 781.183345] generic_gcmaes_encrypt+0xf4/0x130 [ 781.183358] ? helper_rfc4106_encrypt+0x320/0x320 [ 781.183367] ? __kmalloc+0x376/0x7a0 [ 781.183385] gcmaes_wrapper_encrypt+0xef/0x150 [ 781.183400] tls_push_record+0x906/0x1210 [ 781.183427] tls_sw_sendmsg+0x9e8/0x1020 [ 781.183447] ? selinux_tun_dev_create+0xc0/0xc0 [ 781.183468] ? alloc_encrypted_sg+0x100/0x100 [ 781.183478] ? __fget+0x237/0x370 [ 781.183497] inet_sendmsg+0x122/0x500 [ 781.183508] ? inet_recvmsg+0x500/0x500 [ 781.183521] sock_sendmsg+0xce/0x110 [ 781.183535] SYSC_sendto+0x206/0x310 [ 781.183549] ? SYSC_connect+0x2d0/0x2d0 [ 781.183561] ? lock_downgrade+0x740/0x740 [ 781.183586] ? wait_for_completion+0x420/0x420 [ 781.183599] ? __sb_end_write+0xc1/0x100 [ 781.183613] ? fput+0xd4/0x150 [ 781.183624] ? SyS_write+0x15e/0x230 [ 781.183639] SyS_sendto+0x40/0x50 [ 781.183649] ? SyS_getpeername+0x30/0x30 [ 781.183667] do_syscall_64+0x1e8/0x640 [ 781.183677] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 781.183697] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 781.183705] RIP: 0033:0x45b349 [ 781.183712] RSP: 002b:00007fdb187c4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 781.183726] RAX: ffffffffffffffda RBX: 00007fdb187c56d4 RCX: 000000000045b349 [ 781.183733] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000003 [ 781.183746] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 781.183753] R10: 0000000000000040 R11: 0000000000000246 R12: 0000000000000005 [ 781.183760] R13: 00000000000009a9 R14: 00000000004cb1e8 R15: 0000000000000002 [ 781.265957] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 781.267365] FAULT_INJECTION: forcing a failure. [ 781.267365] name failslab, interval 1, probability 0, space 0, times 0 [ 781.267377] CPU: 0 PID: 4237 Comm: syz-executor.5 Not tainted 4.14.167-syzkaller #0 [ 781.267384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 781.267388] Call Trace: [ 781.267412] dump_stack+0x142/0x197 [ 781.267428] should_fail.cold+0x10f/0x159 [ 781.267445] should_failslab+0xdb/0x130 [ 781.267455] kmem_cache_alloc_node+0x287/0x780 [ 781.267465] ? tcp_established_options+0x2c5/0x430 [ 781.267487] __alloc_skb+0x9c/0x500 [ 781.267500] ? skb_trim+0x180/0x180 [ 781.267513] ? lock_downgrade+0x740/0x740 [ 781.267529] sk_stream_alloc_skb+0xb3/0x780 [ 781.267538] ? tcp_send_mss+0xa4/0x2f0 [ 781.267549] ? ipv6_frag_exit+0x40/0x40 [ 781.267562] do_tcp_sendpages+0x7d5/0x1820 [ 781.267573] ? gcmaes_encrypt.constprop.0+0x2f1/0xb90 [ 781.267596] ? sk_stream_alloc_skb+0x780/0x780 [ 781.267611] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 781.267623] tls_push_sg+0x1e1/0x740 [ 781.267644] tls_push_record+0xa4a/0x1210 [ 781.267668] tls_sw_sendmsg+0x9e8/0x1020 [ 781.267686] ? selinux_tun_dev_create+0xc0/0xc0 [ 781.267705] ? alloc_encrypted_sg+0x100/0x100 [ 781.267716] ? __fget+0x237/0x370 [ 781.267733] inet_sendmsg+0x122/0x500 [ 781.267744] ? inet_recvmsg+0x500/0x500 [ 781.267756] sock_sendmsg+0xce/0x110 [ 781.267769] SYSC_sendto+0x206/0x310 [ 781.267781] ? SYSC_connect+0x2d0/0x2d0 [ 781.267793] ? lock_downgrade+0x740/0x740 [ 781.267815] ? wait_for_completion+0x420/0x420 [ 781.267827] ? __sb_end_write+0xc1/0x100 [ 781.267838] ? fput+0xd4/0x150 [ 781.267861] ? SyS_write+0x15e/0x230 [ 781.267877] SyS_sendto+0x40/0x50 [ 781.267887] ? SyS_getpeername+0x30/0x30 [ 781.267901] do_syscall_64+0x1e8/0x640 [ 781.267910] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 781.267928] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 781.267936] RIP: 0033:0x45b349 [ 781.267941] RSP: 002b:00007fdb187c4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 781.267954] RAX: ffffffffffffffda RBX: 00007fdb187c56d4 RCX: 000000000045b349 [ 781.267961] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000003 [ 781.267968] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 781.267975] R10: 0000000000000040 R11: 0000000000000246 R12: 0000000000000005 [ 781.267981] R13: 00000000000009a9 R14: 00000000004cb1e8 R15: 0000000000000003 [ 781.335030] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 781.336882] FAULT_INJECTION: forcing a failure. [ 781.336882] name failslab, interval 1, probability 0, space 0, times 0 [ 781.919749] CPU: 0 PID: 4241 Comm: syz-executor.5 Not tainted 4.14.167-syzkaller #0 [ 781.927554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 781.936895] Call Trace: [ 781.939475] dump_stack+0x142/0x197 [ 781.943103] should_fail.cold+0x10f/0x159 [ 781.947246] should_failslab+0xdb/0x130 [ 781.951206] kmem_cache_alloc_node_trace+0x280/0x770 [ 781.956296] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 781.961748] __kmalloc_node_track_caller+0x3d/0x80 [ 781.966664] __kmalloc_reserve.isra.0+0x40/0xe0 [ 781.971320] __alloc_skb+0xcf/0x500 [ 781.974930] ? skb_trim+0x180/0x180 [ 781.978539] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 781.983637] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 781.988642] sk_stream_alloc_skb+0xb3/0x780 [ 781.992949] ? tcp_send_mss+0xa4/0x2f0 [ 781.996817] ? ipv6_frag_exit+0x40/0x40 [ 782.000784] do_tcp_sendpages+0x7d5/0x1820 [ 782.005003] ? gcmaes_encrypt.constprop.0+0x2f1/0xb90 [ 782.010197] ? sk_stream_alloc_skb+0x780/0x780 [ 782.014767] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 782.019945] tls_push_sg+0x1e1/0x740 [ 782.023650] tls_push_record+0xa4a/0x1210 [ 782.027807] tls_sw_sendmsg+0x9e8/0x1020 [ 782.031862] ? selinux_tun_dev_create+0xc0/0xc0 [ 782.036530] ? alloc_encrypted_sg+0x100/0x100 [ 782.041020] ? __fget+0x237/0x370 [ 782.044583] inet_sendmsg+0x122/0x500 [ 782.048369] ? inet_recvmsg+0x500/0x500 [ 782.052414] sock_sendmsg+0xce/0x110 [ 782.056112] SYSC_sendto+0x206/0x310 [ 782.059810] ? SYSC_connect+0x2d0/0x2d0 [ 782.063770] ? lock_downgrade+0x740/0x740 [ 782.067928] ? wait_for_completion+0x420/0x420 [ 782.072523] ? __sb_end_write+0xc1/0x100 [ 782.076574] ? fput+0xd4/0x150 [ 782.079747] ? SyS_write+0x15e/0x230 [ 782.083449] SyS_sendto+0x40/0x50 [ 782.086890] ? SyS_getpeername+0x30/0x30 [ 782.090942] do_syscall_64+0x1e8/0x640 [ 782.094830] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 782.099674] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 782.104849] RIP: 0033:0x45b349 [ 782.108025] RSP: 002b:00007fdb187c4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 782.115722] RAX: ffffffffffffffda RBX: 00007fdb187c56d4 RCX: 000000000045b349 [ 782.122980] RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000003 [ 782.130237] RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b [ 782.137488] R10: 0000000000000040 R11: 0000000000000246 R12: 0000000000000005 [ 782.144740] R13: 00000000000009a9 R14: 00000000004cb1e8 R15: 0000000000000004 00:47:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) rt_sigaction(0x2d, &(0x7f0000000240)={&(0x7f0000000180)="c482a1a6534e0f6e29f083b1f0ffff7f09d3c6460fac2000c422f9968e00000000f0440fba37ebc4c315183e86440f1821c4a2d1a76532", 0x0, 0xfffffffffffffffe}, &(0x7f00000003c0)={&(0x7f00000002c0)="0f0d9517000000f0873500080000c401e16c9006000000f242afc4a13a515e840f4d2966f30f1ad5c461f8534431ff3edfd9440f1826", 0x0, 0x0}, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x0) creat(&(0x7f0000000300)='./bus\x00', 0x208) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000008040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)}], 0x1, 0x0) recvmsg(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1, 0x0, 0x6}, 0x0) 00:47:00 executing program 0: socket(0x10, 0x80002, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}]}, 0x28}}, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f2, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = openat$userio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/userio\x00', 0x4200, 0x0) fremovexattr(r6, &(0x7f0000000100)=@random={'os2.', 'ip_vti0\x00'}) close(r5) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000130a0000000000000000000000915f91671fed0ad60793ce5adce4de8ab9513fd6922c09e45e5147"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) splice(r4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:47:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/schedstat\x00', 0x0, 0x0) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000180)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:00 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x304}, "d44eb8c7308ec7c4", "4428f42358b5350ade91900b59fc9534", "6bdda720", "7ee51416da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 782.296552] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 782.317537] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 782.344161] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x4, 0x0, &(0x7f0000000100)) r1 = accept(r0, &(0x7f00000001c0)=@can, &(0x7f0000000240)=0x80) connect$rose(r1, &(0x7f0000000280)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22, 0x7, @local}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f0000000140)={@local, @rand_addr, @loopback}, &(0x7f0000000180)=0xc) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r2, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:01 executing program 5: fchdir(0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x5, 0x0, &(0x7f0000000100)) dup2(r0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000240)={0xffffffff, [0x85d, 0x9], 0x401}, 0x10) open(0x0, 0x0, 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000280)={'NETMAP\x00'}, &(0x7f00000002c0)=0x1e) modify_ldt$read_default(0x2, &(0x7f00000001c0)=""/84, 0x54) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) sendmsg$key(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)={0x2, 0x3, 0x6, 0x8, 0x16, 0x0, 0x70bd2a, 0x25dfdbfb, [@sadb_x_sa2={0x2, 0x13, 0x1, 0x0, 0x0, 0x70bd28, 0x3503}, @sadb_x_policy={0x8, 0x12, 0x0, 0x4, 0x0, 0x6e6bbc, 0x3f, {0x6, 0x3c, 0xfc, 0x3f, 0x0, 0x52e, 0x0, @in6=@ipv4={[], [], @empty}, @in=@loopback}}, @sadb_spirange={0x2, 0x10, 0x4d6, 0x4d3}, @sadb_x_policy={0x8, 0x12, 0x1, 0x0, 0x0, 0x6e6bb7, 0x9, {0x6, 0x2b, 0x4, 0x3, 0x0, 0x3, 0x0, @in=@dev={0xac, 0x14, 0x14, 0x34}, @in=@remote}}]}, 0xb0}}, 0x4000) listen(r5, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000300)='/dev/nvme-fabrics\x00', 0x0, 0x0) fremovexattr(r7, &(0x7f0000000340)=@random={'security.', 'NETMAP\x00'}) sendto$inet6(r4, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 782.632839] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setreuid(0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1f, 0x100) fdatasync(r2) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$VIDIOC_S_MODULATOR(r4, 0x40445637, &(0x7f00000000c0)={0xa5, "22d73b15b45f723e275a07b878e1cbb88a6a3de647b75763e35da8adf604ddd5", 0x20, 0xffffff60, 0x9, 0x4, 0x5}) fcntl$dupfd(0xffffffffffffffff, 0x605, 0xffffffffffffffff) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d40)={'syz0\x00', {0x3}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x126, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x2, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x3ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e5], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xffffffff]}, 0x45c) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) [ 782.686440] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:01 executing program 5: fchdir(0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0', "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"}, 0x100) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 782.788621] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 782.815960] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:01 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x4400, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @mcast1}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 782.955411] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 782.980625] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:01 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') sendto$llc(r2, &(0x7f0000000500)="f7a9d10dc9b11c7c0e758fbf62c640b43cb35b0c0f708b9fa83b1c3e0d38fc65ef1e276169ea42b777b4491d0ad78758845574c4784c90aaaddaf03f3c616af05bf5dc66266ad3e02d73b6ee2400eeacdd6426b0fc4a37af9b3a1c11b50a80504a", 0x61, 0x50, &(0x7f0000000580)={0x1a, 0x300, 0x2, 0x6, 0x2a, 0x5a, @random="cbe8051df03c"}, 0x10) preadv(r2, &(0x7f00000017c0), 0x199, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000200)={'filter\x00', 0x0, 0x4, 0x56, [], 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f0000000180)=""/86}, &(0x7f0000000280)=0x78) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000300)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)={0x94, r3, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @dev={0xfe, 0x80, [], 0x27}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_macvtap\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @rand_addr=0x7}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:getty_log_t:s0\x00'}]}, 0x94}, 0x1, 0x0, 0x0, 0x8085}, 0x20002004) 00:47:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r0, 0x3000008912, &(0x7f0000000000)="080db5055e0bcfe8697071") r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$can_raw(0xffffffffffffffff, &(0x7f00000001c0), 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r4, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r5 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r5, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r7, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r8 = socket$nl_generic(0x10, 0x3, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x2, 0x0) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r9, 0x1, 0x0, 0x0, {{}, {}, {0x8, 0x11, 0x6}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_GET_NODES(r7, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r9, 0x400, 0x70bd29, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x4) getsockopt$netlink(r6, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r10 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r10, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r11 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r11, 0x10e, 0x5, 0x0, &(0x7f0000000100)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYPTR=&(0x7f0000000180)=ANY=[@ANYRESOCT, @ANYRESHEX=r2, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRESDEC=r3, @ANYRES32=r4, @ANYRES64=r5, @ANYRES64=r6, @ANYRESDEC=0x0, @ANYRES16=r1, @ANYBLOB="7d7f858a25868bca60a9131416d758368e7c8c7e3118058a1defa8e67b96cbea1445f320e204abfd982cdbf4b32b4e59c65bcae3db0b55fbecf0f0891eb55554a063d0a310e2f4a5dcfa5f4ecad19923503feac5fdb9dc211575130152fea9944c5f0f7c45bb06348215491d0bf15877a9bf96ba686b9d03576353d83be3fb4796dba7760e031dfa68ed726f4f81", @ANYRES64=r10], @ANYRES32=r11, @ANYRES32=r0], @ANYRES32=0x0, @ANYBLOB="0308000000000000240012000b00010067656e657665000014000200050008000100000005000d0002000000050027003200000008000a00", @ANYRES32, @ANYBLOB="58ede051623b206ab23a882d7439f391e9db72b110e047c44d06405c3592f86f16ae6d6f8aff15765cb4ddfa124f89f62ed5fdc1a98884718266e5534e87d6590a9179719d1379109143cf472b59db1c95e2134c21c6b226b82ae610face550a9898dfc1fefa9b7785cfdfc34075a93399baf8896f9cbd1b45a8ff6f0742349f61b8c7961110aeef6646abc869f5434466c2d6d4ebc7b980e90af2409721a5bc559ea5415140c71e4640e246a596f49287e4d207a11c61a094edd06b2384bdfe9cb607a20029f754c3797cf6776690d491dbe8aceaefc0ca51b2398aa3bc5be9fddf0050e3c5"], 0x5}, 0x1, 0x0, 0x0, 0x2000c014}, 0x880) [ 783.187398] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 783.221012] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:01 executing program 3: add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) mlock2(&(0x7f00001cc000/0x1000)=nil, 0x1000, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'vlan0\x00'}, 0x18) bind$alg(r0, &(0x7f0000000380)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x300}}], 0x500, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000040)) 00:47:01 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) setsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f0000000200)=0x2f100, 0x4) setuid(0x0) setuid(0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socket(0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240)=0x202, 0x4000000000dc) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d40)={'syz0\x00', {0x3}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000], [], [0x400]}, 0x45c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={{}, 0xfa4, 0x2, 0x3}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) sendmsg$inet(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="e69a9529df3603558ac8cf55de999bbeae73ccfcc0c292a027c4e0bc1f2bc281d3fc4ded44b3cee9747053e2625d6bb04fa37430216109d65a098056f034f5e91fff67f181462e69a6af455263c9317d8d1ac9073263bb295bc08232746c473ab239559ceaac04d4c1cf5d3594a0ef05c865f5ecfbe91a9fdf239a89aae8e336b56484151457d1ec6f0fce65616faf14acebd8630a422ea248eb2f0197fb4c5815bb919bfbe6412958026377c638f8923f73c94c8576032e", 0xb8}], 0x1, &(0x7f00000003c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xed10}}], 0x78}, 0x2000) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 00:47:02 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_256={{0x304}, "000100", "97c18fa7e396bc1633f8c5af5f210d069f9e1f8c5240bc344f9e72938280c2d5", "9d076305", "e95499c084cee433"}, 0x38) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:02 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/126, 0x7e) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 783.627685] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 783.667354] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:02 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000840)='.\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r0, 0x300, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0xc8d2) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000140)={0x1, 0x5}) 00:47:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7472616e733d7463700a706f72743d3078303030303030303030fafd30303030302c70726976706f72742c006a5b56ab5ac231119510e3d713a4149aea9a8b9eae114f3b379d0e49635646dd2743b16aa29e"]) prctl$PR_SET_ENDIAN(0x14, 0x0) stat(0x0, &(0x7f00000001c0)) unshare(0x20020000) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000240)={0x8, &(0x7f00000004c0)=[{0x20, 0x40, 0x0, 0x20000}, {0x0, 0x1, 0x0, 0x1}, {0x8, 0x1f, 0x7f, 0x716}, {0x0, 0xff, 0x0, 0x3}, {0x4961, 0x4a, 0x80, 0xfffffff9}, {0x0, 0x8, 0x3}, {0x0, 0x0, 0x6}, {0x6, 0xfb, 0x0, 0xffffffff}]}, 0x8) poll(0x0, 0x0, 0x400007f) rmdir(&(0x7f0000000180)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x100, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={'nr', 0x0}, 0x4, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @loopback, 0x0, 0x2003}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x1410, 0x8, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r2 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x101000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400000, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x7) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="3eab3510c4b121cb9e92b22019384c9536fb6536e836c6"], 0x1, 0x0) 00:47:02 executing program 3: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x200}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000000c0)={0xff, 0x4}, 0x2) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000025c0)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000005780)=0x5, 0x4) sendmmsg(r0, &(0x7f0000005680)=[{{&(0x7f0000000140)=@caif=@util={0x25, "42cbd08a841a8385b28e66f1c1efd217"}, 0x80, &(0x7f0000002600)=[{&(0x7f00000001c0)="36829914024b118a1047f499ef4dc30b590cc4424013b568caf1e67698bcfc775923467a7545300520838995f08a8fadf91c43cac6687c590664ca896f8c917d3b9fc8773e6dc688e32201d0d5f756dc6fbdfffac2", 0x55}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="7399484c9d6451be561dbedb4345f4e357e5275b7235ddfd1d18c10e0a601ecdc9b59419d37f7065e0b2f14e5f17e2bd70918460a6716077b8abba19eab973b5e5aca5b23e9d9a868696d41a002036d1aeab8df2994c", 0x56}, {&(0x7f00000012c0)="6e115370696099c42f90d32bd693b562983104bed4c5a523d4de7c217603e57133f5ba48931a6af3e45f913a0adaaa40989726b754499ae4893d328d265dc7d6d0ce91477976f34a74b1b8ac9e69854c70135d55146890cf324e3c8fb779cdc373350355010b8704d32e2cf051492c8841c2980655931de8a294093b47b25d034a857a58c98e7fe5e8bdd4c5f370647ef0b6aab8d6f2d33965a697c0ad7a307e5222f42e2b56b6237ae41462f4ac90593dabf00e0853afb3f498a696c7d0f3d05be51a48efca1a5b92eccb", 0xcb}, {&(0x7f00000013c0)="867a177045543e799293c35b2695807b37e1a237c058fe3814d1ba72653c4f1c59d59a239991bbc059eb29a4d84abcc26ba486fd9768ef09b20add69bb8217f64ada5e7c19ce5283a6ae4eb35aff2b453e52e0e9bc8194101b1f92c2c190b84fdda7cf2b7b0c5aff246d0562d9971029fcd3f18bf892be1067", 0x79}, {&(0x7f0000001440)="55d751abcd71998fbedbe33bdead9e2d365616eb05f5b9689445507b6454a3f693e1fcb582ca0540b034c1652a98f6f331cfdb8d6a6db84e17564455028f1ad2aeefbed697d9750ff0067d492268316c0bf195cfc990316287c46075e9ca46b2e881a056c43d504c6680077eef9aa9cc3fbe983add4e01e6b71142ed0f24eb653d7fe8d7f6c3711456df6a83dcf77f5831c79cc9812cf3f116b1c7d27f45d7b6e719d0715141adc1e8a35e4da474dbbfd8037819b80c8d89f43bf61234f23375423c9c7a1888636241dd5cd260983239dbf15f1414629c6c877aed204d5c436786da6f9125f0432e49d4635281ada4", 0xef}, {&(0x7f0000001540)="f02f088961e915357f0fe5d012b8a1773297b093a80c8c18c88fbf138a5988a260a3773c82edff283b7c000e3e71590ce9cb", 0x32}, {&(0x7f0000001580)="be27680bf59f393220180ae5e126b6c0c089434e2c580ef7872e3ba985ce0204df066ca0de3a", 0x26}, {&(0x7f00000015c0)="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", 0x1000}, {&(0x7f00000025c0)}], 0xa}}, {{&(0x7f00000026c0)=@ax25={{0x3, @null, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x80, &(0x7f0000002ac0)=[{&(0x7f0000002740)="5b0c1a4c5e53e34bb89b559ec07f9261d06a5dda65f878c4f59b380ea0d0c91c41e8bd7eaa5aa985df3aeb646ff1c1d1022b7ea0403a97168880a2d64e390a4977635a7a09c15410fcbf24b994c2940dc3e570b58fc616cbe2306e6cd72ad36fbac5be00d6acb8e3642110f412b3c773ed97b1326417effbf70b28d0b55fac", 0x7f}, {&(0x7f00000027c0)="046dd1e1bc964f16b78047c88e192af515927250f66b80c921522b0820d3ac338ec091a7affda106bb3844fb19449d031e0006baf04be3810956d6d2cbbc4d2d1f90683d94471f38a23cd4083423bfd20aec14ce7eaa334023a71ed889eba4ed91041c1c1b1a3be6f14f016d3d1f7e4322349e06d674d6fdce417b527525e65a39eb908f52dd822f79625a55955a5cb33454221610f1562ffca4f3056d717c34a70dd9340e51c9dcd70e5d443d3afc3fdb7ac36ea04a34e6dff7b10ffbb6d2", 0xbf}, {&(0x7f0000002880)="99e61f412419f9579e9592f6235b494a16d988cccb07735d2b54fb0025bdb8f62f1b2e13cfd1340cc645fb6b9bb7b1eba1cd7c3404292d470804f1c90fd067fd5d3d730cfb6f7137d4b48a1231a4b762962a3be95e49a2c507490caad59b1816ae7a7700898893bea12aaf160acc02551a0b965181d9f009883e249ecdeac00fc4684692880d588e60777b655e3c78c890cc76131a1f095ea8b5b8d99bbbea3dd9e25f31df402ad9d18c6f83aa2c08", 0xaf}, {&(0x7f0000002940)="6b1c8e5b881e8dac790e2c057e03d86e6a2ee6da8ab2f3bf6ff0b220efa483615f81adc4f3d84c5b69e275f263ab5f84549ca2d63a4a4b19341637fdc4a8d3aa0e2f9d99d336a9a268b4630b64ab2a7d59bc42dcf2ada8deecbfd123cc", 0x5d}, {&(0x7f00000029c0)="a9436e4cedc49f9d15ed023da7a89efa25406720a634ddbeb6cc6a82981eeea8df24af07e0d5dd90613d5358365b464b535c6eef8e9c39cad5f3f48e71a838f453fb8c9e46c071dffd01768b1ec123ea3a37a8820237889c57cf904651a7ddc4455930f8f56be874996adbc9cdd901d2eefa7291cd02bc50b111357e1c2527b4643d9eb1de0eed0c3da92463a949a94d63c629d1a0502636cee2cfb14e5c8dcf4ddffb019255e1f25f1cb639ec9af7225b0d224a94cd1aa6f117124a0684bec9b94eb0ef306084be7cbd1ed1b158e118a87fb94f01c8e1807e28b580df7879dd2e87dcc57d5822d504d803c802e1c5efc449168ee8d4a3e6c2", 0xf9}], 0x5}}, {{&(0x7f0000002b40)=@pptp={0x18, 0x2, {0x1, @remote}}, 0x80, &(0x7f0000003e80)=[{&(0x7f0000002bc0)="d3190a0e", 0x4}, {&(0x7f0000002c00)="d62b72e8ae481934f771a13792cabfafeb7b7064c4993a", 0x17}, {&(0x7f0000002c40)="0011907252fdf9a80186153d191aca5e7d2fd3fac9e69587434ee640ac3481a8fc663e0b8e5735781486f5e45503d5205cc0", 0x32}, {&(0x7f0000002c80)="acb7063f1ce02e8b839d7d8d483c81c20cd8142a6404bbb0e4df35228cb46fa77e06f224a0d8d606ad19c1e29d7c7a639ac060ad0fe9b2c2781f6f4ddcc53f73e436c10fcc97a89a33e1a47ee7c8fcd605cfd7678ebf337f91086ae8b98f06a58d74dce712531d0b3e45be01d25acbed045b425c097e90d80024daf997994124582cc29fc2aea97e995a1ae49fbdb85ad80e0ec8069f4fe49258", 0x9a}, {&(0x7f0000002d40)="18753e310b53a59ead75811c", 0xc}, {&(0x7f0000002d80)="768918711c2fd80a43c3102e700eb6f309af92bef29884f066c0fba383176c6405e3f24e134b8d51aaaf10b26e61662fc4ba631c602d9741d4bdbee081ce2e6ae2dafd7723a2d86336fb8e1f98f352cbc96a0304379aa4c5014b94816af1d85e0468752fc0ec1f27e550bdec4250080025662a2aa130881c0a39e14b1221338e58e8fbbafadb75e2b33d11a1dca10d505445b46eb7964dfef3d05a91c07995fa6c9de92aae1cdf4411031f45f20371ead08fa5c11c5effcf5dfaa8a818fce333b69390d99488e76db515106dbd507a3d1ef8827f5242faf33a176c9d16a9483ea3e0438f871f55933f13d4e0", 0xec}, {&(0x7f0000002e80)="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", 0x1000}], 0x7, &(0x7f0000003f00)=ANY=[@ANYBLOB="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"], 0x1430}}, {{&(0x7f0000005340)=@ax25={{0x3, @bcast}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000005580)=[{&(0x7f00000053c0)="8c3a204ed952a491e823534fbfe9681a943d5f62a2992fd699f847ad874e9d0d23471a2f4565f258e459837a3f2f8131244f3002e981e17ef40d1efb28e85d4c9d8d564a9cc8f6eee421ec0e9bb005f112b3da688273ecb9fb39899c281d9d1cac292922b9a1d31beb8a7257e01229cdce3624879b0493dbf04536", 0x7b}, {&(0x7f0000005440)="decbb457d3f264260a82dc54f282c1e1e94bb93e76dac48c7ee212b8eebd35bc02fd852362c7dc9e1fb06c5733985d132b5634f365e1dcabfc802c8ec2354f6626dc378f0b5ae49b709026717b130b43e84ffffa899026cdd66a3bbb606bf04fadca2330fd4791ece407ee8e2a0d44b25575ff5090a0081076a5d097becfd7179296505bb8c9275feec7dbc67df5be71", 0x90}, {&(0x7f0000005500)="d4f27bdb7ed51b432ad279fb9273677fb53952cd8d6f52aece7bf0db4071ecef87bf114951ef5f193f8fdfb78eaca68fb2d9c6ed47474e62b588a295999cb0cff233bf66e0ee95a10d8f5b29f1661471119b196e", 0x54}], 0x3, &(0x7f00000055c0)=[{0xb0, 0x109, 0x80000001, "6459b25b47ab0164daf382d33bd574cf76f24f5a87e993ea6ed64fa93e69b13f8ccc8ceddccdfe9a9ee4ff4c180195ed34ba503e5e5bfadc63f979295919a2a1a889dacf9e217c72df41ebb32b776ed56daeaca926d1653471f9db92a718a83dda67977773e5a20d2de6d23595a5d4d13937fc2a4a5420fa41e06b670029e4873467037d4f092f5c92dac8f9eed6f0b6eb2165dbd1e7ca0a49620e"}], 0xb0}}], 0x4, 0x80) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) [ 783.882077] 9pnet: Could not find request transport: tcp [ 783.882077] port=0x000000000úý00000 [ 783.957963] 9pnet: Could not find request transport: tcp [ 783.957963] port=0x000000000úý00000 00:47:02 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, r2, 0xb03, 0x0, 0x0, {0x13}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x101}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xac, r2, 0x4, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80000000}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER={0x6c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @rand_addr=0x1}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x5, @remote, 0xb8}}}}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x4}, 0x4) r3 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10001, 0xffffffffffffffff, 0x10000}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0xa000, 0x0) setsockopt$bt_BT_RCVMTU(r6, 0x112, 0xd, &(0x7f0000000180)=0xf404, 0x2) 00:47:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/kvm\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8b01, 0x40) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000040)=""/103) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = semget(0x2, 0x3, 0x310) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000580)=""/253) semop(r5, &(0x7f00000000c0)=[{0x0, 0x4, 0x800}, {0x3, 0x70b8, 0x1800}], 0x2) r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f0000000140)="266426650f38f1b9fb4a36660feeb600580fc7590f0f009f04002e670f01c90f070f01cbddc7ba4300ed66b9c30d000066b80000c0fe66ba000000000f30", 0x3e}], 0x27e, 0x0, 0x0, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d0]}) ioctl$KVM_RUN(r7, 0xae80, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) 00:47:02 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000a00)={0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r5, 0xc0206434, &(0x7f0000000b00)={0x2, 0x0, 0x10001, 0x1}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000b40)={0x3f, r6, 0x0, 0x3000000000000}) r7 = geteuid() r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r9) mount$9p_tcp(&(0x7f0000000280)='127.0.0.1\x00', &(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='9p\x00', 0x4, &(0x7f0000000b80)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e24,posixacl,debug=0x0000000000000000,privport,access=client,cache=none,version=9p2000.L,euid=', @ANYRESDEC=r4, @ANYBLOB=',uid=', @ANYRESDEC=r7, @ANYBLOB="2c2795715691b8e68d055f667569643e", @ANYRESDEC=r9, @ANYBLOB=',func=CREDS_CHECK,\x00']) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x10000081}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000002c0)=0x0) r13 = syz_open_procfs(r12, &(0x7f0000000800)='net/rt_acct\x00') preadv(r13, &(0x7f00000017c0), 0x199, 0x0) r14 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r14, 0x10e, 0x5, 0x0, &(0x7f0000000100)) sendmsg$nl_route(r13, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r11, @ANYRES16=r14], 0x3}, 0x1, 0x0, 0x0, 0x4000040}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r11, 0x6}}, 0x1c}}, 0x0) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) r16 = dup2(r15, r15) syz_mount_image$ocfs2(&(0x7f0000000140)='ocfs2\x00', &(0x7f0000000300)='./file0\x00', 0x100000000, 0x6, &(0x7f00000006c0)=[{&(0x7f0000000340)="8a0e704ac510424fe604bcb8b1808ce373b920fcbaabba755f8f87839950843e2f280fc7bf1c37b44f9b3af05bec0179f139f9e6b78115e20b804c881b8832c620db3e1f16ac7eb849ef0ff0a47ec47a0d336373c4a95ff1a7269e6e2e6d2c5581e30f9c34f7bcbb10c20874538e219789af082388235d91b32d2161740551", 0x7f, 0x1}, {&(0x7f00000003c0)="68243a7185a9d9708e48938791897b9b72c5e1a0ee3b5836983ce888aa3c1b76122fc4e132b62f20695b3329a6f99f82d3e5c58dd52ed25fe9636ed3f7a89c27592044586312a468b877cba65791674b9124151e5c987c0a65db237faacba080d6bccf56da3c7c6f87343355a968edb0f43b1b2c2bb36befc0038b3049703ef082934acb3f2c34bfbfcee09e6c71185bcff6", 0x14}, {&(0x7f0000000480)="db03ea7cdc1a0e0e3ab078d348983180ab47fb7a7a948b7fea419cf225f5ee016960f1181b4edae24a131123bc5156d83c6a0cfab0ae83ea4589689f26a8ee97789999fe9cb7b4fe81d8ae68d5e75d7df7782b74c672c5c3e0637135fe03a75777c8d29712956220ce8f781fbfa969ca3942d02b62c4", 0x76, 0x1}, {&(0x7f0000000500)="7036e52a7d5c5e839b8a64cc67eb287be2cd84b922afc2850d38e6aa0fdbcb74d6dd27c3", 0x24, 0x3}, {&(0x7f0000000540)="825aea9678ead7637720205404682daf002844270831a00bef758874e6f83b66e9c66335628d1cdfbc29f5c45fb33dea5887f79ee48b7cf145fa0809b71a8a35a34e35f36124823ee75e594a", 0x4c, 0x245}, {&(0x7f00000005c0)="c1f61387bcac6bc70d9a14f10314ce1bdff572046f98e439c74be613621749ffddd57ecdd25a896d640be1de8d95864bf870567c87fabbf44242f2bfb821f875d1e1e6acb4d10bf2fd69ef01421a20b28c6151999653aa572c148e095c47b85a258da6063feb90fe27155e1b53cc21ff7d989070af891828786da01b1894a7f26f89a67862e7d8e07c2f51d7b6bb38e8eb44198df12107e38d318b6bd51995a8384f68c8bfe4b942c849a8b3832e59966e66d6cc9c64db13bd547aa4bc5e9bc99b699d4152c8e66c8d682086d21e989779339381ff031058bd1d", 0xda, 0x1}], 0x1011000, &(0x7f0000000780)='\x00') ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 784.065316] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x2343a726) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r4 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r4, 0xc040564b, &(0x7f0000000080)={0x3f, 0x0, 0x3016, 0x3, 0x4, {0xfffffe00, 0xff3}, 0x1}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) recvmmsg(r2, &(0x7f0000002440), 0x3ffffa3, 0x0, 0x0) [ 784.126773] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:02 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:02 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000001780)=[{{&(0x7f00000072c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x80, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x9}}, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r2, &(0x7f00009322c4)={0x2, 0x0, @empty}, 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmmsg(r2, &(0x7f0000004f40), 0x3ffffffffffff80, 0x0) dup2(r0, r2) tkill(r1, 0x1000000000013) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r4, 0x84, 0x74, &(0x7f0000000180)=""/4096, &(0x7f0000000040)=0x1000) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) ioctl$KVM_GET_TSC_KHZ(r5, 0xaea3) [ 784.192997] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4333 comm=syz-executor.4 [ 784.229158] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4333 comm=syz-executor.4 [ 784.260433] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 784.283729] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4333 comm=syz-executor.4 [ 784.298163] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:03 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) timer_create(0x4, &(0x7f00000001c0)={0x0, 0x3d, 0x0, @thr={&(0x7f0000000040)="45f0c01d42615dd31c3a2f0331d283a281f01dd8e66f725ba8a8882e751a4af745ec7a424d04a558bf428d233a2305c2b80243c77846e80bde0049670845ec6fce084a3f73bb477965cc46564f6b0c5f17c60df02770919474664948a9a56f3499bad5aa85d9e322c4f73a859a22cc6d6ba75e489efc5f89e0efed0edbb31d47c451579207e5ee4a0841dbb958d0b3a37042f9813ef6566f20cd1a2fc1164b294130fb4b904853b2f8b1b9735dddf253989bbb12f0814b21f755e628e0b55267d25f144cd9c3d494daa552105cbce130abdb8c91ff71561f54e9764198", &(0x7f0000000140)="ede6f6f521261d5179dd9df89660c4df1e28e2fed0ab9cf210cee369f4f9922e28c2b57e9a9b91b349cd97613725834a45aad6a8faace61784aba6c79a93e840b74f96e90617621facf2"}}, &(0x7f0000000200)) mmap$fb(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x84051, r0, 0x0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) mmap$fb(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2db184ea314fbff9, 0x13, r1, 0x6000) 00:47:03 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x200008c0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 784.331157] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4333 comm=syz-executor.4 [ 784.358051] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4333 comm=syz-executor.4 [ 784.409773] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4333 comm=syz-executor.4 [ 784.422175] audit: type=1400 audit(1579913223.114:477): avc: denied { map } for pid=4342 comm="syz-executor.3" path="/dev/fb0" dev="devtmpfs" ino=1192 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:framebuf_device_t:s0 tclass=chr_file permissive=1 [ 784.477372] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4333 comm=syz-executor.4 00:47:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x5, 0x0) r0 = socket$inet6(0xa, 0x3, 0x5f) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r1, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x24, r2, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40080}, 0x4000010) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r3 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000001c0)) 00:47:03 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = dup(r0) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000140)={'macvtap0\x00', 0x0, 0x9}) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) getsockopt$MISDN_TIME_STAMP(r4, 0x0, 0x1, &(0x7f0000000240), &(0x7f0000000280)=0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/cachefiles\x00', 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7e010430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000480)) sendto$inet6(r2, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$PNPIPE_INITSTATE(r5, 0x113, 0x4, &(0x7f0000000380)=0x1, 0x4) getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000002c0)={0x6, 0x7, 'syz2\x00'}, &(0x7f0000000300)=0x28) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) sendmsg$nl_route(r6, 0x0, 0x0) [ 784.541689] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4333 comm=syz-executor.4 [ 784.588969] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4333 comm=syz-executor.4 [ 784.626277] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 784.652882] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4333 comm=syz-executor.4 [ 784.684995] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:03 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:03 executing program 3: r0 = socket(0x28, 0x3, 0x0) ioctl$VIDIOC_G_EDID(0xffffffffffffffff, 0xc0285628, &(0x7f0000000040)={0x0, 0x3, 0x1, [], &(0x7f0000000000)=0x2f}) write(r0, &(0x7f0000000300)="2400000012005f3414f9f407000973ca2db90fb88e67003e787400050000000000000000", 0x24) [ 784.827390] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:03 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x202040, 0x8) dup(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000140)={0x1, 0x2}) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @rand_addr="0400000000000700"}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:03 executing program 3: capset(0x0, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000100)='#\x00', 0x0) write(r2, &(0x7f0000000580)="0602000000f7b17403000000554751bee493a321d7662170f07f171861f7c09959702ad5d23b0cbc121925a773d09ae1db9a90d073e53bfbd547f063804b319322e6e405ee8e16a996adb975287ea4ea874353a02912ec1d10a8d97f43e9fa1a5c70836eee18c82c5de7f7265ab6f596893c2e9ad80cf9b09710f6", 0x7b) syz_open_dev$media(0x0, 0x89fe, 0x400001) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, &(0x7f0000000040)=0x1, 0xe0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) close(r7) r8 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r7, 0x84, 0x71, &(0x7f0000001100)={r9}, &(0x7f0000001140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=r9, @ANYBLOB="36000000ac6a82d2b5acd821e04d0478a474465b59949467f2294d5265768be9c2be3b387e029887626c7e3cf456672c29c8210efff7d4d24bdf54e0b4d4271fef64e6ae9a4218f8e2164e"], &(0x7f00000002c0)=0x3e) ioctl$sock_x25_SIOCADDRT(r3, 0x890b, &(0x7f0000000140)={@null=' \x00', 0xe, 'veth0_to_batadv\x00'}) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000900)=ANY=[@ANYBLOB="40000000000025000400000005002c00000000000000280000000000d4040000006ebd451a22dec4c83108206624ca7a4f9d38e16565a16eb68ca2227b28aa5a5282ff43ba0c2b77d868c0757da79288e04d05da00f45ebf460b26bbc8ff1a1aecab81fe6d383a064ea312ba66db4ce4948913585fc97ed370ddb2a3acadc69287b2e940eb689162949f0e102da9edd02e3913d84945b63c470000000000003d5e1e904c000000000000000000dea589cc0a9f9257a7c96663f4eb30be1c4672b8f2"], 0x1c) sendfile(r2, r2, &(0x7f0000001000), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r2, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f000002eff0)={0x1f0, &(0x7f0000000000)=[{}]}, 0x10) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000001900)="b04270d0bc6aeb13c47f56732cfdc4d99daf81ddcb8e1e8451ab3deb87bc62c6c5eed4c6a857c32927e4c4826e376032da680a69aab0356c750adb585635f3fed90781823e3dbef1b357691cb45a11cf5c14b95ac083563de797c8e38481f516509e5d6eca0155dc7ff38897b521508bdf7403c87019c26d296c6112eb52ba40a7e1362045e2a6f31fefeaa601bcd1584e06fd8019d2354640f915e917bc93833e01256d1f7038ed8ef34137bc63beb94ee2b2bac1020e3f8e18f156db846e3ca2368ea11dc5fb2a7e1fee35b5e72a9a94f186622c2fa2292a5421d519c8", 0xde}], 0x1) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) 00:47:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) sendto$ax25(r5, &(0x7f0000000180)="95be9197d17b120cf62332e4e0b3c7f3f002b8eec8277bbdbf9837fa3c05fa1aac1da72b2a9617d7d4ef1080450aa569694b64aacc348001587c3a7e87b3710736931c1ba21326099b24f66bddf4cd45a8f533dbc2486a0690", 0x59, 0xc0, &(0x7f0000000240)={{0x3, @default}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000140)="6566430f3880b6a00000002666470fda8138f7d252660fe799070000000f01cb400f781666b8c4008ec866450fd7dac4a1f95bc664460f350fc7b200000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x4a, 0x0, 0x0) pipe(&(0x7f0000000100)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:47:03 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) open$dir(&(0x7f0000000000)='./file0\x00', 0x404042, 0x180) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2c200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x24012, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpgrp(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x1f, 0x80, 0xfd, 0xde, 0x0, 0x40100, 0x0, 0x9, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800, 0x1, @perf_config_ext={0x1, 0x101}, 0x802, 0xfffffffffffffff8, 0xce, 0x2, 0x3, 0x7f, 0x6}, r1, 0x5, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "b1e7245d4c751aa4", "2342fa00", "f0bf6874", "fa7830c819b0b6a6"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:03 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x1, 0x6f, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x101}, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:03 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 785.217728] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:04 executing program 5: fchdir(0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x1, r3}) 00:47:04 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x8, 0x2, 0x0, 0x0, 0x0, 0x200000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ioctl$PPPIOCDISCONN(r0, 0x7439) ftruncate(r0, 0x1002) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/create\x00', 0x2, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) syz_genetlink_get_family_id$net_dm(&(0x7f0000000240)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4008805}, 0xc8001) 00:47:04 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x53) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001380)=ANY=[@ANYBLOB="000000001000010400000000313c0000006e7213303025d918053948a0e5f9fa000000", @ANYRES32=r5, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001740)=ANY=[@ANYBLOB="1c0000205e009ec95a1cd3e5af7d00000000000000753f17750f6a45b0617aecc711a20814c1ca3c0a93ea7a98009cffd4c060251efc8d80fd53c2b2769176df7d09cbdbbc3298bd6d8e1878d1c5c59f1410d65546dcaeb900bf405d70c155250ce9edd3a5d28526ce159e670e63a29a", @ANYRES32=r5, @ANYBLOB="06000000"], 0x1c}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) setsockopt(0xffffffffffffffff, 0x4, 0x2, &(0x7f0000000300)="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", 0x1000) r8 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r8, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001300)={0x0, 0x0}) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r11) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r12) r13 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r13, 0x10e, 0x5, 0x0, &(0x7f0000000100)) fstat(r13, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001c80)='./file0\x00', &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) r16 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r16, &(0x7f00000017c0), 0x199, 0x0) ioctl$NS_GET_OWNER_UID(r16, 0xb704, &(0x7f0000002040)) r17 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r18) r19 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r19, 0x10e, 0x5, 0x0, &(0x7f0000000100)) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r20 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r20, &(0x7f00000017c0), 0x199, 0x0) statx(r20, &(0x7f0000003780)='./file0\x00', 0x2000, 0x80, &(0x7f00000037c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000038c0), &(0x7f0000003900), &(0x7f0000003940)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r13, 0x29, 0x22, &(0x7f0000001440)={{{@in6, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0}) r25 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r25, &(0x7f00000017c0), 0x199, 0x0) statx(r25, &(0x7f0000001600)='./file0\x00', 0x0, 0x10, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r8, &(0x7f0000003a00)={&(0x7f0000000140)=@proc={0x10, 0x0, 0x25dfdbfd, 0x40000000}, 0xc, &(0x7f0000003700)=[{&(0x7f0000003a40)={0x484, 0x40, 0x4, 0x70bd25, 0x25dfdbfd, "", [@typed={0x4, 0xa}, @typed={0x8, 0x79, 0x0, 0x0, @u32=0x9}, @generic="39287b9270330854d772746d1e7bac2d6e605cd4166f7af42764dac7773e4b08d2607e741f39fa670c26fdd3df767bcb", @nested={0x19d, 0x32, 0x0, 0x1, [@typed={0x17, 0x10, 0x0, 0x0, @str='posix_acl_access:-\x00'}, @typed={0x4, 0x62}, @generic="4ab8060f06a41b9645979ba0af82dc5abe8c0cfb3afec38729b1b947dad325b29eb6168073691129f7425fd264d90fa7e499e1263b59718a7a627f256e063bd7a4d29016c784772691abb07cc868e722e6b51d52c9a3cff05d5d", @typed={0x35, 0x6a, 0x0, 0x0, @binary="97b1c375c01ec1f7ce3fa21d7117a01eb8baa95e70dc11ecaf2032a826635c21ccee0449fce261a764468e796becbd1bd1f64781"}, @typed={0x8, 0x11, 0x0, 0x0, @fd}, @typed={0x8, 0x7c, 0x0, 0x0, @pid=r9}, @typed={0x8, 0x2a, 0x0, 0x0, @str='em0\x00'}, @generic="2af4f34bed68a8f99e8c6c5c5830b6a78cd06e49c52d399ded14eec63ba129a8cdbd92bb3e468eeeb33f0f98d08d9d30d6a08a1f22abf967ec4ad4e98f3518f1f60b2b92b7ab2f7c69abb0c5100f9e943442e7967e1962c99deb9363901f559b5e1b6969578bd4d72b310e32f64802cffe2c69c6b128999e8e52f8c7fdb137b17b24355961455bd5c128222bdabe352d7ffa9af9354924537c2b53c16ceec3ec67717880e20e3f33bd3c8093701f38c0ee4dc882feb2f29a552f9ca85a88659b8cce1a00939ac9848adc70ec240482f406b622"]}, @nested={0x230, 0x4a, 0x0, 0x1, [@typed={0x5, 0x46, 0x0, 0x0, @str='\x00'}, @generic="c5a68052a6611ea60ff87a090655316c3e4b8b0ba1681fbc3c2e13b2eba68b5646b3c9ac364db7faded933c707ffcd8c380a7eff44db6841da670c4d71c3ddaa1b1dcf31985a337d9297c114be84b80988053cfc9e5dff9827c469087c8628f96f4f4cee7d6e4549e53f400428513c7554bb852e4c3dc00e5310b727", @generic="10a6103bf50ef49ed6d5d7d7ea8b58eafc57087319c2ae5e4dc948206badb75409ad72af3fab5f0b1a8d35a8e6dbc1e1f13fa9979023923b951b892c8cd3375b4d14fe45d8fbf2e26234ad3af81424660035004566745a2eae2fbb02", @generic="5d78da2f3e5cbe775de606b4ab2e93cf57c2fb33289d67e575d066228b1c9d8e1cfe3688a772c23be3ac96b96ef124986d24e021c84c40abaa1b89719fde4f95ce9c59fb675c01e8ea003f9cf19da22b73c3e35717f44182547336103182d34dd40376e1776e07039097984a9a36b45ff489888e1e3564839f1131d7fbad190f3d4d", @generic="e5132a97e57773b2323253e251cc9a443f396bd6ee4384cbac618182f21ce18bf378126bfaab4025a6ed476f85b874cecdb04d3b2dc58917e782", @generic="2c2da9fe39e45a57b4b693f4543ced6cfba47edbd2630a3b97f7e058acecd07f8574eb7f26a2ac9e5eb974c0ef6357b0e9731aaf42527db6395fdf482a0a6c68d0332caf2c2683c84dbd0dfb044f349529565374b61fbdb9bcc8ddce596e8e8df07a2dc3979d2e9a24e24ddede0a7ddfeb9ef91ff2a44922e053f5ee8595b7a5e5ce6f91cf3e5d9d", @typed={0x8, 0x76, 0x0, 0x0, @uid=r11}]}, @typed={0x68, 0x1c, 0x0, 0x0, @binary="c8e80850e1344d6b81ff61f974417ba9263cdbcbee482fc4fb706e79160b262f9ed14c09da07ccea54825774ea47ff1460de85fc98d3a851a44c45c380b7ccc25f803044eaefe557df76a212e1ca5a76061e34115a65df51092237d58de5d430d1000801"}]}, 0x484}, {&(0x7f0000002440)={0x374, 0x36, 0x4, 0x70bd28, 0x25dfdbfc, "", [@generic="1738a780246bb81693a4f215dcf677d93ab64f9857e0c972291bff6e67d1dc5e7ab5f5b009b5638bd5f9333e9dcf3546d7a464b0a3d2e93d9fabc7b55692ec0a6d6ce62b82fb0d460c779dfc6fa6170e0acbf851f7497a401b69592bcf66b40c5a1c46681c1bc499e451c8485b8b34ecee83fd37b6991523959cbbc2cb3cd6047ba80743b2dbcd113d234bbc0e14c7629ca09c063a4cd2f6e63a1a46", @nested={0x148, 0x35, 0x0, 0x1, [@typed={0x8, 0x5c, 0x0, 0x0, @fd=r3}, @typed={0x14, 0x92, 0x0, 0x0, @ipv6=@local}, @generic="978c4d7e82fbecb5494e8c525a0a6604b05cda81f486ef5cb32e7b4e3c5f3c9955d3fca9ad732731278b77aa", @typed={0xfa, 0x31, 0x0, 0x0, @binary="acb7e904ace3a44327e331cf7e5572ee50a063a5d28110f917d88f81e6490bbeb27ef8d5ac0ef422ffee009d1774293ca87dc9e0eac33930a5dae57b6d57c5ce79746faee127bfed507070b7a0de4c7bc2027521476cdf426043add5ba106e266cec11ae60bb6308f391608709d6852cd3a10fc149c75dceff576b22fb7be5859006cb7130d60756c911cce1f36801c35b8ac73b27d4caee70910b165b26cd1104f741fc40de801acff6f2aa2aa9505c58749c979081646acf29c5d3f888a5254211573e3eff834a0bfb9d8dab4ebe637febd5c3bb9da807c80a6d1e831690fa4f87541d73d641874d5d9bd62ff0a01040e4ba0939d4"}]}, @typed={0x8, 0x57, 0x0, 0x0, @uid=r14}, @generic="5cb258f8d1e73bbd267cb19527c2cf9b82d9e627b0c96e216e26d25d04fcbc966b09502b00f2a57a5f4cbfd4bfbad73360fa9138ae6ba30c41fa2887bf9cf485cd097a5485baaef6032008b528b52a5c94b58602b254908307c558be80f4e500a33bfe944eb4667c9878b8174dc13010d923f565a5032a0f4511efd245ea34783dbd95c665b8c76857665cc9fb8988ae4c6adffa52ed61a053babb2924b3ee664de7ba67dee556fdc89dcd99d6978ab044530b7382fb5d48b0fd23f1a45cdd124e2800307dc3b7205b6e1f0f1b1ad516f16aae022cd3bf5494", @nested={0x91, 0x6f, 0x0, 0x1, [@typed={0xe, 0x6f, 0x0, 0x0, @str='mountinfo\x00'}, @typed={0x10, 0x91, 0x0, 0x0, @str='vboxnet0GPL\x00'}, @generic="41692db5421b8a9814928207391d3590d2d0f3d3a1f723168814c5e15a23333e1499e50d574e9bbb2a492d9f47597f140b5651504061d02a76f81f682563061df7e1b15efa0decd3512be90dde9f139697afd4d5cb8bd9e3085e85e70631d86231219b5b3284549885dac7ecb3"]}, @typed={0x8, 0x1f, 0x0, 0x0, @uid=r23}]}, 0x374}, {&(0x7f0000001a40)={0x238, 0x3d, 0x1, 0x70bd2a, 0x25dfdbfe, "", [@generic="35a7010dfdbf2466f729d28234eaa6074275b1f8e3bbbfce44c452ff1ae71e3895f50e19f2432da8b0abf73387299eb380b521b9443209a97708e6ed7b914f8b7ccaac424055064e21353994cabf4d52855097d311b89db94c2cd364530e4141547897958145400d55051f296faa3ba0aec6ffe64322ff758458376b1aabf0d52e88c5930e84f1dc39ba2111d42867bb6044aa", @typed={0xc, 0x73, 0x0, 0x0, @u64=0x69}, @generic="646eca81b2cc27eb00c0ea6ea12e8f0a7f029e2aa8c60002", @nested={0x9c, 0x33, 0x0, 0x1, [@generic="c963159d564be26cfffe1dd7a1033e9185b50e6cf3a25dfa6d79188ba5627a710fad0d46f300a328a2345b783b43579bdd4760066b5829e5878f8d93cf087a978de063294ebd132ba9b346a7c3c4044760252f90e781934319f28c6d63fbd691c5688edc7ac407b3bc980e043bba7f36aef6f0d8c61f722cef05945c1ae89089f97e02c93f3afd16a61a4cb5ec308d6c", @typed={0x8, 0x2, 0x0, 0x0, @pid}]}, @typed={0xc, 0x2a, 0x0, 0x0, @u64=0x10001}, @nested={0xbb, 0x71, 0x0, 0x1, [@generic="a3665dbfd267fb22a74fa013b2e0c3418f3a9047c480daf54b93cf8c8c37162e132f939d145651f75f376ef412bbf2b80fb7c8f4db150c8b7bb781b05420cbe1dd5d39b286a5368df7d2d4a617617743e16bb3e7ec9e5412f273ce7b5774d46d6434d7e225c102495b9c3d166e16eb37529cd60c41926b6131f0d5a613a462cf4cd40f139d8ddc0af16fa76384e7fd87eef964c54eac816f7d657f3cb2d4662cbaa1bee0b2a188837b7b5dfcd761844e44774bdf2f10ea"]}, @typed={0x9, 0x29, 0x0, 0x0, @str='self\x00'}]}, 0x238}, {&(0x7f0000001d40)={0x2d0, 0x23, 0x20, 0x70bd2c, 0x25dfdbfd, "", [@typed={0x8, 0x3a, 0x0, 0x0, @uid=r15}, @typed={0xc, 0x48, 0x0, 0x0, @u64=0x8001}, @generic="8fec669cf2990278965348d74993f0543e4959d511e104cfabaf596fa0f319767a660a720fa3d8bbd9fb32b73d78334c78a527a756dedce65ff0614f15ec41c647611f3a8f065b0cf0d16771801792a3786ed59a709b3cc29a9a8eea2e96dcda66b7251ef0e29601ebf83d0b773ad19cea64d01a7d6c14a742f4db55452600cb07c382390a79223e496a5af963e2254d84ae0feb354b1ec70989b50e38f93e47", @nested={0x137, 0x67, 0x0, 0x1, [@generic="3aa74b2d0f36eaed01a6efe4f45c95c55b793f35bb20514e7f5873c1ea68a3d5c34507e33b687b5aa34f4a82d44f694f3c7aa35b358cb9bf43fd5b75eef931575caef7da74d83e1b71c6d3104da956e5bc9a9791aa7ddd3fab679cadad0da088f795f4d11d58e28a42e32b0c3234105456f2d06076c5e4c0b3ae58003d5553", @generic="34dc003477cadec411efaf79f92cffa5ab9feac3483a1d4b938ac54d21217de7636d960133ec70ca9d9b2a61ae3501f188ee0b3e6226a7b16bd6ca2d2cfe84e8d4399d261930abd54e11a3c031e78d475c18a1e5806e9e37f684a02d8ddcea5c8ec2d99828506cf1651fb41e42e601363840f87d8b42aa1f8c2b3e619733fafb87a2873b03f921f655a721c8795b12a6097d1de5dcfe9264763bb904703252378431a56384d5357de062bb4f2df18144b58449bb"]}, @nested={0xaa, 0x32, 0x0, 0x1, [@generic="889020c84ca0ec3ad96067476692e71a79de9ffe914a1e83773c55e9dc215518990d65af3ed9a7cf893dcc17cd15eb51cca1ee4324375c8fe41d94b651ca54cc7b01a163949e75fca3fe3ce9a9d66c25b665d7cfa08e568fa138a9a8c09f83ab6ce69690fa8b8433f801291e7750d433f4cdefe860f0e402aa42265530d148e04f432b765d1b2f39ce1f18fb623b441035bd", @typed={0xc, 0x1, 0x0, 0x0, @u64=0x6}, @typed={0x8, 0x88, 0x0, 0x0, @fd=r4}]}, @generic="9f5978a5afa61592ed267f6cba27ba288f2e10d4613fc7a52be69022e24de42d40b42dae906d"]}, 0x2d0}, {&(0x7f0000002080)={0x10, 0x3a, 0x100, 0x70bd25, 0x25dfdbfc}, 0x10}, {&(0x7f0000003f00)=ANY=[@ANYBLOB="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", @ANYRES32=r24, @ANYBLOB="197ec9eec699107226d51404ab13d77d04c8e14e682438da66ca329ad0ef90c1a20949f5594bc27683a72282ae44f1651c0d03fd64a57b79fd00176e4dbbfd3c33bd64d1fe9ce03d93ca0f45c49ef59119baf52010fd9ff13af8c0e8", @ANYRES32=r26, @ANYBLOB="08009600080000000c00260007000000000000000026679f8a595f6492095418c4ff954a0b7f7ea17a24f42c4be24bb80b60af0a4284a795b183b4b70d8e10eaaac3a349f0042fb95b4d54c13ab2829b21965cb275e2af2e872eeb2d4c9e85ce8819446a05f4c533f94892fe563ca21e77251c811908b7fd4acad9ffbc872a27f2987995602d90f98e3cca4c921dc1d3f13466c7cf76b67cc1f8001f2eb835b0ea11bf1ee76037c8f44aa33e513262dc99399bc0870ecb85cfdb006480b5e8168ddab4c151dc525203e40790e0d1a8a1a8fb7a098a696e5cbb5aed8e1eb3b368dbddc09f4ab54adfaa3534bad853bcd5df7974d3c77cfad7c9b667c2aaf50026023ee9fc4342184bef7934fd46646c8991eb961c1d7bd648a1ef7187281bbe809d08c42236b103bd1fa302646ee404ed1ce661702625ab173804a3f80496d2ef2b0e7f99f0d91d255322c0753f9ac82357cdf178ca7b87c901cce68d52d337a507cbccbb0e30de5cf5f19e0ef8c3c2abd535c146fdf5355fcb08006f00ac1414aa0c0068000008000000000000829be00400720000"], 0x318}], 0x6, &(0x7f0000003980)=[@rights={{0x14, 0x1, 0x1, [r19]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r21, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r22}}}], 0x58, 0x60004000}, 0x20000880) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 785.363480] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:04 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x76fafcc59df483ab, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20, 0x5}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 785.436370] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x38100, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000040)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x14, 0x1a, 0x0, 0x1, [@AF_INET={0x10, 0x2, 0x0, 0x1, {0xc, 0x1, 0x0, 0x1, [{0x8, 0x4}]}}]}, @IFLA_GROUP={0x8}]}, 0x3c}}, 0x0) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvme-fabrics\x00', 0x10040, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) r3 = socket(0x10, 0x80002, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") [ 785.496484] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 785.529145] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:04 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000500)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000440)={r2, r3, r4}, &(0x7f0000000600)=""/250, 0xfa, &(0x7f00000004c0)={&(0x7f0000000480)={'sha3-512\x00'}}) keyctl$invalidate(0x15, r4) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r5, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x2, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4008000}, 0x1) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000140)="39a110", 0x3, 0x41, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 785.628692] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 785.644575] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 785.667740] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 785.688784] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 785.711682] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 785.727040] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 00:47:04 executing program 5: fchdir(0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000001c0)) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x2000000000000006, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000380)={0x1, 0x6}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000140)={0x7ffffffff000, 0x3c7, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000180), 0x2) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) write$fb(r4, &(0x7f0000000200)="bb51324665c513dfabd50a8c53e3bb635f443c00c3234410d1dbde18f59071ad005ab24d47c1ae362e208ea57ae30c580b58", 0x32) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x8002, 0x0) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 785.742416] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 785.837044] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 785.878145] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:04 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@ccm_128={{0x303}, "58299b6717af0106", "11a39186dfa2b2062d243416dd83a32a", "b0f98653", "f2621ee8b6346278"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000000000001000040ffffff7f00"/32]) 00:47:04 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x5, 0x0, &(0x7f0000000100)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200800, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r1, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r4, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r6 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r6, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_INTERFACE(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000000)={0x14, r8, 0xb0343aabd1184b87}, 0x14}}, 0x0) sendmsg$NL80211_CMD_START_AP(r6, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x628, r8, 0x800, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, 0x1}, @NL80211_ATTR_HIDDEN_SSID={0x8, 0x7e, 0x2}, @NL80211_ATTR_SSID={0x19, 0x34, "b3cb85228e4117f310550ac0d5efb49f1c21966b86"}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x1}, @NL80211_ATTR_CIPHER_SUITES_PAIRWISE={0x18, 0x49, [0xfac0d, 0xfac0b, 0xfac0d, 0xfac0d, 0xfac08]}, @NL80211_ATTR_IE={0x5c8, 0x2a, "bd2fbc6fd7ee41901c9010522570fea41441272cb79f5a20e838849bc072cb926221142a4774aff3b84f1aa24269687ce3fa33eba29e59e5b5e10bd9510dd908b9a1322b50a868b18c3cc26dd749013d5f1a43e2c867af081b767b4b27b1ee1fbd03760942a8ef8350a674a4afad42a46b057de67ebb50e608f4a81f79e8e3ee98592549ab58ef18390032647b1e1d2b41f66e676a4875e3a620cd2b78ad4a584a0b8c5b64178d43540fe828157f379b0e2e5ca4f26a24ad68fc8f1bcfb7517acf9619ad1768c39e4d9d8b4d542c806ede9801863118c50a5adcb324a6be95fc20f8388e592216b5c3bb077f83c873409380f63d7348c4db07479b6a9217effdd254099a87e2082d1b207fb8d85c747bbdc62cd1d83ea9eb425a23c60fe4e7a85f1cab550993b6b57792c187ed3392e9a47fe4ffb89829214fa1350b5d030c5ae3ed7941f57f4cb7a3d2fcf3fdac9ea7c749bc958a77e3b42ffaebfe156808528ffac5633e39b2166f5f1935d0df587b6f879121afd2834ca5e6bb17df785707dd68979b5b13b699f5f48b329720986552dd94fd79088182bbd360395446567c5fce664d563b68856e9f27e80da1af7539e9b619207edc27a5699cedf3549c73583ca404c89f707a9fbe1731c8127accb8ee4ab84d1f2fe6247ff3f6641275b46915ac02a25bd409d61053efa0e396ccbd948f072ea1e5d9f7761baf18b57a61c1c9ee00d9f4c9815e95af32f99644aa6897d1d90b615f94f45e48577e43e26cbadb7af857facdea03366b79d0d0bad65dff39cdeb751a71a7cfe4fdf1308593c66ccb709afde5a04417003654245998c4458e0020ade27b07986c572f8e075bd783b99484cc07ff443f4d106f140d1d94b6267d02995a9a4ef4fbdaa79b72ba9d83b1d8965ec63b9cbf89fe8047f53a0110533a39b5f86b7a00cddd40712952068409e5a5e1b90dbe7d4137825583b597a2b12fb5064484fbe9eb4f99fcc06d78b0f3f8c20f022ccd1a0d4b9b35f80879d52322c01885786e48dd9119ac011225de38f6113c3869e657e36e14813db6abd77c164a183f7a29a33ccb9cea3be1d849f0f31ebce539e9df9e302f5051888f1d6ee16bfda2327eeeb07fe94a1014408144e841cfffac317fab9c83ffb2c005bb61ab101c0428c7b75a113866cddacf968d93f0022add2caf4e68c664701814bca93eb85fd9ece7df81934e44222beccee015e228dbfd9c875045b3a409c422035591d22db84a5968065df556bd6c3a400b2f10b94ed12d0f7be80d3a84163982826a71bf7f15dcd2cbe6018da2d8287b5248b9856d9c3d77f4ca8ade18f09cc31a935c8996e908a97c57a08ba812b05d05ef68671cb4e4151ebb2ff2772ff40ad1a2cb465ca7128931ecc4f23dd67010707e3576b17b6dfa7b75b2b21253f0badbb1fe92bef33d479037b46afe9c851125d352b39dae1a518c496c4c5f74cb8e631072fbe38ba285cd9184ccc4a9c533223681db7741f0961f79926417c9028b3a920871b5232b25750faff9b31bd5b2bd0407e525db391ba6fbf4ce338a6f5e9dbc34d5db2253475f671e40c531e202bc823382e1378197117a2993ee8ac3bda7eb7641bdcf5be4decf889510c3a09cfbac8c9f18bb80c4e1d72db02d1a6c730df7a52a2af6a1110d6c1893cd4a8205f21d67565fc42cdd081f0b5a25671db67b72f69b017534aacf2358913af07455579e606489da2956baec6cada83cc9d7da0889c2026aa8dfefc657a2ac15b3a5e368009181f8669b87b234b92d3fe6c34ba9332ee12c7b3ad7bce6db0518d7f99f8193b8a07d717f7f128c3820963f3640dad99738999806a126452db9d824be8725207427b1a5b0d068c77dd43d7ee855e24e0654e68ace27392593763ca73b824cce41db9b7b0e948a91ecb05ff352c9081c47604f7e75e643e52fb00bd45f52bc781a0ec402f2788eb76fc8554e51e4287fd5b45f253216fbc53aa72f0c08a6e9bb76eeee4f078162ce3b56167f01480cc891c8e072dad6193dfa8afcb0fa06fef9cf0757a6ef7ad3d088ace1072c44ab7d404247a3ae7157642d861235fdcb5e"}]}, 0x628}, 0x1, 0x0, 0x0, 0x8040}, 0x20000004) r9 = fcntl$dupfd(0xffffffffffffffff, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_SCRNMAP(r10, 0x4b41, &(0x7f0000000000)) [ 785.970500] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 786.028422] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x114e, 0x3, 0x0, 0x8}, {0x8, 0x6, 0x5, 0xfdf4}, {0x0, 0xfd, 0xd8, 0x101}, {0x6, 0x5, 0x2, 0x10001}]}) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) fcntl$getownex(r3, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sched_getscheduler(r4) ioctl$SNDRV_PCM_IOCTL_XRUN(r2, 0x4148, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-twofish-3way\x00'}, 0x58) dup3(r0, r1, 0x0) 00:47:04 executing program 5: fchdir(0xffffffffffffffff) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcsa\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x7, 0x9ca, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000240), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{0x5, 0x14, 0x4305, 'veth1_to_batadv\x00', 'batadv0\x00', 'team_slave_0\x00', 'erspan0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff, 0xff], 0x2f6, 0x326, 0x356, [@ipvs={{'ipvs\x00', 0x0, 0x28}, {{@ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, [0xff000000, 0xff000000, 0xff, 0xffffff00], 0x4e20, 0xb9, 0x4, 0x4e20, 0x1, 0x8}}}, @bpf0={{'bpf\x00', 0x0, 0x210}, {{0x1d, [{0xffff, 0x0, 0x0, 0xa0}, {0x1, 0x7, 0x0, 0x7fff}, {0x0, 0xee, 0x6, 0x5}, {0x4, 0x2, 0x4, 0xd1e}, {0xb062, 0x1, 0x0, 0x1f}, {0x3f, 0x1f, 0x0, 0x9}, {0x1, 0x9, 0x93, 0x1}, {0x241, 0x5f, 0x1, 0x3f}, {0xef85, 0x3f, 0x1}, {0x8000, 0x1, 0x3, 0x6}, {0x6, 0x0, 0xf9, 0xfffffbff}, {0x800, 0x1f, 0x8, 0x100}, {0x0, 0x9, 0x6, 0x6}, {0x200, 0x7, 0x81, 0x2}, {0x9, 0x7, 0xc9, 0x9}, {0x2, 0x4, 0x9, 0xbdce}, {0x2e, 0x2, 0x7d, 0x6}, {0x0, 0x6, 0x20, 0x5}, {0xa2ca, 0x66, 0xfb, 0x6}, {0x7, 0x8, 0x53, 0x2}, {0x8, 0x21, 0xfa}, {0xf4, 0x2, 0x7, 0x1}, {0xa37, 0xff, 0x2, 0x80}, {0x798, 0x40, 0x5, 0x1}, {0x1, 0x6d, 0xc0, 0x8}, {0x2, 0xbf, 0x4, 0xffff}, {0x9, 0xde, 0x8}, {0x9, 0x6, 0x1, 0x8001}, {0x8, 0x8, 0x2, 0x9}, {0x400, 0x7f, 0x2, 0x6}, {0x7296, 0x8a, 0x65, 0x7ff}, {0x101, 0x4, 0x1, 0xffffffff}, {0x0, 0xe6, 0xa0, 0x1}, {0x101, 0x44, 0x41, 0x2d38}, {0xb80c, 0x0, 0xa3, 0x9}, {0x6, 0x5f, 0x18, 0x3ff}, {0x2, 0x80, 0x0, 0x3f}, {0x7, 0x6, 0x0, 0x8}, {0x401, 0x21, 0x0, 0xfff}, {0x1, 0x2, 0xed, 0x416c188e}, {0x20, 0x3f, 0xff, 0x1}, {0x3ff, 0xf9, 0x1e, 0x5}, {0xa0, 0x6, 0x0, 0x8}, {0x9, 0x88, 0x0, 0x1}, {0x9, 0x9, 0xfc, 0xfffffffe}, {0x77b3, 0x93, 0xff, 0x9f4}, {0x5, 0x8, 0xb8, 0x10}, {0x3f, 0x1, 0x6, 0x7}, {0x81, 0x3f, 0xda, 0x3}, {0x6, 0x0, 0x3f, 0x5}, {0x6f, 0x2, 0x1}, {0x7a4f, 0x9, 0xff, 0x5a5d}, {0x3, 0xef, 0x9, 0x7fff}, {0x1f, 0x8a, 0x6, 0xfffffc01}, {0x37e, 0x1, 0x7f, 0x98}, {0x3, 0x3, 0x2, 0xffff6ff7}, {0x4, 0x6, 0x1, 0x30f}, {0x1, 0xff, 0xd9, 0x1}, {0x7, 0x1, 0x49, 0x80}, {0xffff, 0x7, 0x0, 0x3}, {0x1000, 0x1f, 0x1f, 0x3}, {0xfd0e, 0x0, 0x3}, {0xfff7, 0x7f, 0xbd, 0xd94}, {0x2, 0x4, 0x5, 0x6}], {0xffffffff}}}}], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x8001}}}], @common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}}, {0x1b, 0x6a, 0x6005, 'ip6_vti0\x00', 'erspan0\x00', 'veth1_virt_wifi\x00', 'ipvlan0\x00', @broadcast, [0x0, 0x0, 0xff, 0xff], @link_local, [0xff, 0x0, 0xff], 0x6e, 0xe6, 0x136, [], [@common=@nflog={'nflog\x00', 0x50, {{0x7f, 0x5, 0x4, 0x0, 0x0, "45b34e4c1890079f61cd8069adeef099c57217494f87ac5b1fa551466a76abe8da1604ffc372d7c98e1f2621e3f4774f6418b059e1783941c451e6cfd3d60699"}}}], @common=@log={'log\x00', 0x28, {{0x7, "9b0e198fc4eaa137ff65b929734fe724c6389471958289a2bdab07cbbdc5", 0x8}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x2, [{0x11, 0x2f, 0x6002, 'ip6gretap0\x00', 'ip_vti0\x00', 'hsr0\x00', 'dummy0\x00', @empty, [0x0, 0x0, 0xff, 0x0, 0xff], @empty, [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], 0x6e, 0x6e, 0xb6, [], [], @common=@ERROR={'ERROR\x00', 0x20, {"cc89e4f6b2cf625ae60405f9605fc8da39ca149ac12e652f41ee67ef0209"}}}, {0x9, 0x48, 0x88f5, 'veth0_to_hsr\x00', 'ip6_vti0\x00', 'syz_tun\x00', 'veth1_vlan\x00', @broadcast, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @broadcast, [0xff, 0x1fe, 0x0, 0xff, 0x0, 0xff], 0x9e, 0x9e, 0xee, [@state={{'state\x00', 0x0, 0x8}, {{0x9}}}], [], @common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x0, 0xefa4, {0xef78}}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffc, 0x1, [{0x5, 0x39, 0x8, 'team_slave_1\x00', 'team0\x00', 'syzkaller1\x00', 'gretap0\x00', @link_local, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], @remote, [0x0, 0xff, 0xff, 0xff, 0xff], 0x6e, 0xe6, 0x12e, [], [@common=@nflog={'nflog\x00', 0x50, {{0x47, 0x0, 0xd3, 0x0, 0x0, "d74cd50b532f96f5a9f7fc11a85247a732e0e9567fdb28cfecef0479605dcafc2ea38a967990efdfac76987c7d605d0c34153b3c0bf81d0eeae98d56e930e381"}}}], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x7a, 0x6, {0x1ff}}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff, 0x2, [{0x3, 0x2, 0x2, 'nr0\x00', 'rose0\x00', 'veth1_to_team\x00', 'vxcan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], @empty, [0x0, 0x0, 0x0, 0xff, 0xff], 0x6e, 0x9e, 0xce, [], [@common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}], @common=@AUDIT={'AUDIT\x00', 0x8, {{0x1}}}}, {0x9, 0x40, 0xf9, 'lo\x00', 'veth1\x00', '\x00', 'xfrm0\x00', @broadcast, [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], @dev={[], 0x31}, [0xff, 0xff, 0xff, 0x0, 0xff], 0xae, 0xae, 0xde, [@quota={{'quota\x00', 0x0, 0x18}, {{0x1, 0x0, 0x4, {0x6}}}}], [], @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0xa42) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000000140)=""/156) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:04 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x113) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2366696c653020f0"], 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 00:47:04 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) ioctl$SIOCGSTAMPNS(r2, 0x8907, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r3, 0x1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r5 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="4800000010010d0600d87d345d28000000000100", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="aaf20000d046b85cb01e92550250a490cff4300ad49be094008010bcf7bdbbd065501305f5a4d0dacee21d438be196e80742259eb3a1ac7e004b94f9b7ab4baa81cf128f5f61a199ab7c2badfb67c00ca013e15c05fb9a13f9557e4a9191f6c477a723c6fc1f10aca3e062d95598fbf27d12a60451f0e13ceed34dda1a105b18979383f0ef5237116d32d45ead01d0cb6ad41f7185ad664506ae44b9c79abba5de97372bd4a87357cd6c895780dcebe38410add118"], 0x48}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f0000000140)={0x20}) pwrite64(r4, &(0x7f00000001c0)='T', 0x1, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) write(0xffffffffffffffff, &(0x7f0000000180)="e16925b08f54accaab52859c64d5be3f5b4fbe71438e96fcadbdc8014c2f3b4f91fbef2b25720eed6b6237d7", 0x2c) r6 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, &(0x7f0000000200)={{0x2, 0x0, @identifier="68a8ee7466ec92e203f75900eb743c6e"}}) [ 786.199060] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:05 executing program 4: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000004e5890010000000000000090400000000306100"], &(0x7f0000000300), 0x28}, 0x20) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000380)={{0x0, 0x0, @reserved="46b23ede93d93f8db5c5acee2aa7756dd67f04008900000500"}}) close(r2) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r6, @ANYBLOB="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"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x6}}, 0x1c}}, 0x0) r7 = shmget$private(0x0, 0x13000, 0x0, &(0x7f0000feb000/0x13000)=nil) shmctl$SHM_STAT(r7, 0xd, &(0x7f0000000140)=""/34) shmctl$IPC_STAT(r7, 0x2, &(0x7f0000000240)=""/135) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 00:47:05 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x404b40, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xffd7) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r2, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x80, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r5 = userfaultfd(0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r7, &(0x7f00000017c0), 0x3da, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f0000000200)={r8, 0x800, 0x6}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000200)={r8, 0xffffffffffff7fff, 0x10001}) r9 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r9, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x62160555]}) ioctl$KVM_RUN(r9, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r9, 0x4400ae8f, &(0x7f0000000780)={"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"}) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f00000001c0)={0x6}) getsockopt$inet_dccp_buf(r4, 0x21, 0xc, &(0x7f0000000040)=""/11, &(0x7f00000000c0)=0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x6, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r10, &(0x7f00000017c0), 0x199, 0x0) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r11, &(0x7f00000017c0), 0x199, 0x0) ioctl$KVM_RUN(r11, 0xae80, 0x0) [ 786.358945] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 786.386222] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 00:47:05 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f0000000200)={0x4, @multicast2, 0x4e23, 0x2, 'ovf\x00', 0xa, 0x20, 0x2c}, 0x2c) setfsuid(r2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:05 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) readv(r2, &(0x7f0000000480)=[{&(0x7f0000000280)=""/233, 0xe9}, {&(0x7f0000000380)=""/76, 0x4c}], 0x2) getsockopt$netlink(r1, 0x10e, 0x9, 0x0, &(0x7f0000000100)) getsockopt$SO_TIMESTAMP(r1, 0x1, 0xa9d3d128af47dba0, &(0x7f0000000140), &(0x7f0000000180)=0x4) r3 = perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "8d8800", "7ee51430da3f51b3"}, 0x28) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f00000004c0)={'IDLETIMER\x00'}, &(0x7f0000000500)=0x1e) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) fcntl$getownex(r3, 0x10, &(0x7f00000001c0)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 786.479908] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 786.507545] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 786.646567] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) restart_syscall() sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x40000, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000340)=0xe8) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r7, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6}}, &(0x7f0000000480)=0xe8) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x410, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@debug={'debug', 0x3d, 0x8}}, {@aname={'aname', 0x3d, 'tls\x00'}}, {@access_user='access=user'}, {@debug={'debug', 0x3d, 0x8}}, {@mmap='mmap'}, {@cachetag={'cachetag', 0x3d, 'mountinfo\x00'}}], [{@dont_measure='dont_measure'}, {@obj_role={'obj_role', 0x3d, 'nodev\xc5}]selinuxnodevvmnet1@,-:}\xcb}%\x00wlan1&-uservmnet0'}}, {@measure='measure'}, {@fowner_eq={'fowner', 0x3d, r4}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@euid_lt={'euid<', 0xffffffffffffffff}}, {@fowner_gt={'fowner>', r8}}, {@subj_type={'subj_type', 0x3d, 'mountinfo\x00'}}, {@pcr={'pcr', 0x3d, 0x12}}]}}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "62d960757f917b25", "2ee97431552870c032a30dadc9fc1389", "c667f73f", "36741bd72455ecc9"}, 0x28) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_ADD(r9, 0x0, 0x482, &(0x7f0000000380)={0x32, @broadcast, 0x4e21, 0x3, 'wrr\x00', 0x8, 0x40, 0x74}, 0x2c) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000500)={r11, 0x0}) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f00000007c0)={r11, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[0x8, 0xfffffffd, 0x8, 0x4], 0x11, 0x3, 0x3ff, &(0x7f0000000440)=[0x80000000, 0x200, 0x20], &(0x7f0000000780)=[0x2, 0x8, 0x6, 0x9, 0x0, 0x5, 0x4, 0x401]}) preadv(r10, &(0x7f00000017c0), 0x199, 0x0) accept$inet(r10, 0x0, &(0x7f0000000140)) sendto$inet6(r0, &(0x7f0000000080)="39a111", 0x6e, 0x8055, 0x0, 0x0) [ 786.876755] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 786.899897] IPVS: set_ctl: invalid protocol: 50 255.255.255.255:20001 00:47:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x141800, 0x0) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_tcp_int(r4, 0x6, 0x4000000000014, &(0x7f0000000000)=0x80000000002, 0xe3) recvmmsg(r4, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000002c0)={r5, 0x1, 0x6, @dev={[], 0x1f}}, 0x10) setsockopt$inet_mreqn(r4, 0x0, 0x20, &(0x7f0000000100)={@multicast1, @empty, r5}, 0xc) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@rand_addr="7c2a68361c35420c575da1882a50bc1a", @local, @rand_addr="aea68b16dcc316ead8a8c47ede04c023", 0x0, 0x5, 0x400, 0x500, 0x877, 0x80000000, r5}) preadv(r2, &(0x7f00000017c0), 0x199, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e20, 0x9c0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}, 0x1c) [ 786.928110] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 786.949317] IPVS: set_ctl: invalid protocol: 50 255.255.255.255:20001 00:47:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @rand_addr="0008f400"}, 0x1c) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x432000, 0x0) epoll_pwait(r2, &(0x7f0000000180)=[{}, {}, {}], 0x3, 0x3, &(0x7f00000001c0)={[0x5]}, 0x8) 00:47:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @remote}, 0x1c) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x84103, 0x0) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x200, 0x7f, 0x4, 0x4}]}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:05 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000580)={0x81, {{0x2, 0x4e23, @rand_addr=0x6}}, 0x0, 0x3, [{{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e21, @remote}}]}, 0x210) [ 787.398292] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 00:47:07 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000300)=0x40) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000005e000100"/20, @ANYRES32=r5, @ANYBLOB="06409d74180227f1194e2d0d8526d7c90000ede48378e9c3e8faab6e619e"], 0x1c}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 00:47:07 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000580)={0x81, {{0x2, 0x4e23, @rand_addr=0x6}}, 0x0, 0x3, [{{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e21, @remote}}]}, 0x210) 00:47:07 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) r0 = dup(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000500)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0), 0xc, &(0x7f0000000680)={&(0x7f0000000900)={0x68, r1, 0x0, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DST={0x14, 0x1, @mcast2}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @dev}, @SEG6_ATTR_HMACKEYID={0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x44040}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, r1, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0xffff0001, 0x0, 0x10000, 0x2]}]}, 0x28}, 0x1, 0x0, 0x0, 0x24001854}, 0x8000) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r5, 0x1, 0x0, 0x0, {{}, {}, {0x8, 0x11, 0x6}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r5, 0x200, 0x70bd25, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x3}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x20040010) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 789.152319] IPVS: ftp: loaded support on port[0] = 21 [ 789.211021] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 789.229862] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 789.230266] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 789.265218] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 789.280922] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 789.342371] selinux_nlmsg_perm: 230 callbacks suppressed [ 789.342383] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4483 comm=syz-executor.4 [ 789.362368] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4483 comm=syz-executor.4 [ 789.375247] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4483 comm=syz-executor.4 [ 789.387760] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4483 comm=syz-executor.4 [ 789.400753] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4483 comm=syz-executor.4 [ 789.413234] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4483 comm=syz-executor.4 [ 789.425994] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4483 comm=syz-executor.4 [ 789.438458] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4483 comm=syz-executor.4 [ 789.443253] chnl_net:caif_netlink_parms(): no params data found [ 789.459981] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4483 comm=syz-executor.4 [ 789.478445] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4483 comm=syz-executor.4 [ 789.518971] bridge0: port 1(bridge_slave_0) entered blocking state [ 789.525831] bridge0: port 1(bridge_slave_0) entered disabled state [ 789.533012] device bridge_slave_0 entered promiscuous mode [ 789.539856] bridge0: port 2(bridge_slave_1) entered blocking state [ 789.546317] bridge0: port 2(bridge_slave_1) entered disabled state [ 789.553374] device bridge_slave_1 entered promiscuous mode [ 789.573103] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 789.582815] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 789.601033] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 789.608145] team0: Port device team_slave_0 added [ 789.613887] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 789.621213] team0: Port device team_slave_1 added [ 789.636555] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 789.643679] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 789.669697] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 789.681227] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 789.687471] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 789.712707] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 789.723455] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 789.731361] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 789.753771] device hsr_slave_0 entered promiscuous mode [ 789.759636] device hsr_slave_1 entered promiscuous mode [ 789.766412] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 789.773583] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 789.842874] bridge0: port 2(bridge_slave_1) entered blocking state [ 789.849336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 789.856111] bridge0: port 1(bridge_slave_0) entered blocking state [ 789.862537] bridge0: port 1(bridge_slave_0) entered forwarding state [ 789.898230] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 789.904642] 8021q: adding VLAN 0 to HW filter on device bond0 [ 789.914654] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 789.924722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 789.932357] bridge0: port 1(bridge_slave_0) entered disabled state [ 789.939101] bridge0: port 2(bridge_slave_1) entered disabled state [ 789.948987] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 789.955241] 8021q: adding VLAN 0 to HW filter on device team0 [ 789.964426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 789.972182] bridge0: port 1(bridge_slave_0) entered blocking state [ 789.978709] bridge0: port 1(bridge_slave_0) entered forwarding state [ 789.995618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 790.003463] bridge0: port 2(bridge_slave_1) entered blocking state [ 790.015219] bridge0: port 2(bridge_slave_1) entered forwarding state [ 790.029745] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 790.048212] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 790.065447] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 790.076126] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 790.084275] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 790.097680] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 790.105461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 790.113198] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 790.120988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 790.127966] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 790.141845] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 790.149292] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 790.156536] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 790.168772] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 790.239059] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 790.249788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 790.289481] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 790.296963] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 790.305405] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 790.314781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 790.322867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 790.329792] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 790.338866] device veth0_vlan entered promiscuous mode [ 790.351191] device veth1_vlan entered promiscuous mode [ 790.356936] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 790.365794] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 790.379812] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 790.389650] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 790.396973] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 790.404652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 790.412790] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 790.422127] device veth0_macvtap entered promiscuous mode [ 790.430457] device veth1_macvtap entered promiscuous mode [ 790.438843] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 790.448748] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 790.457635] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 790.467980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 790.477851] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 790.487643] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 790.496790] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 790.506575] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 790.515757] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 790.525547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 790.534802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 790.544563] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 790.553734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 790.563697] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 790.573742] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 790.581291] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 790.590288] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 790.597970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 790.607798] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 790.618128] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 790.627412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 790.637465] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 790.646685] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 790.656450] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 790.666058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 790.675901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 790.685078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 790.694833] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 790.704069] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 790.713850] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 790.724075] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 790.731163] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 790.738377] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 790.746200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 00:47:09 executing program 2: openat$selinux_create(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40046f41, 0x76006e) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) r5 = shmget(0x1, 0x1000, 0x54000000, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_STAT(r5, 0x2, &(0x7f00000002c0)=""/248) syz_genetlink_get_family_id$nbd(0x0) r6 = dup(0xffffffffffffffff) setsockopt(r6, 0x0, 0x20, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r7, 0x0, 0x0, 0x0) pipe(0x0) 00:47:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000040)={0x0, 0xfb, 0x78, 0x3, 0x9, "ec7dd524a9509ab34b3b4204d35a3826", "965d4cbeed8432eeddf93a8d7b9f3a9ab6cf90c20a46b147afbaac7747749861e0cec29f8b00967aec8ac5ac6ebba185571689a28144493704234e336c369c0f67c8af1b5d8f5c89de8ef95e48106e7cd92ba120ce403b02aa38ecc39db12f06c8edf0"}, 0x78, 0x0) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) fsync(r1) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x3a8) 00:47:09 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x20000040, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=r5, @ANYBLOB="000000000700000008001400", @ANYRES32=0x0, @ANYBLOB="14002b80080004000800000008000100", @ANYRES32, @ANYBLOB], 0x3c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r6, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$sock_TIOCOUTQ(r6, 0x5411, &(0x7f0000000000)) 00:47:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000200)={0x200, 0x0, 0x7, 0x80000000, 0x4, 0x7f}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x20000, 0x0) ioctl$VIDIOC_S_SELECTION(r3, 0xc040565f, &(0x7f0000000180)={0x5, 0x100, 0x1, {0x1f, 0x3, 0x80, 0x80000001}}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000240)={0xa, 0x20004e22, 0x0, @rand_addr="c071246494e2a6a3aac854154f0a44b3"}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) ioctl$RTC_WIE_OFF(r4, 0x7010) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000300)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:09 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r6, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0x4000000000014, &(0x7f0000000000)=0x80000000002, 0xe3) recvmmsg(r6, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000002c0)={r7, 0x1, 0x6, @dev={[], 0x1f}}, 0x10) setsockopt$inet_mreqn(r6, 0x0, 0x20, &(0x7f0000000100)={@multicast1, @empty, r7}, 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in=@broadcast, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@empty}}, &(0x7f0000000140)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000400)={{{@in=@loopback, @in=@dev={0xac, 0x14, 0x14, 0x2c}, 0x4e23, 0x7ff, 0x4e20, 0x0, 0x2, 0x20, 0x80, 0x2c, r7, r8}, {0x5, 0x5, 0x3, 0x0, 0x3, 0x8f8, 0x8, 0x4}, {0x6, 0x4, 0x5, 0x10001}, 0x8, 0x0, 0x1, 0x0, 0x1}, {{@in=@empty, 0x4d4, 0x33}, 0xa, @in=@loopback, 0x0, 0x3, 0x1, 0x1, 0x7, 0x0, 0x4}}, 0xe8) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r9, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000005e000100"/20, @ANYRES32=r9, @ANYBLOB="51c21700"], 0x3}}, 0x5) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 790.915718] Unknown ioctl -1069525409 [ 790.924976] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 00:47:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000140)={'macvlan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r0 = syz_open_procfs(0x0, &(0x7f0000000640)='environ\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xbd3) ioctl$BLKIOMIN(r0, 0x1278, 0x0) [ 790.960317] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:09 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) accept$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, &(0x7f0000000180)=0x10) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:09 executing program 0: ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000080)=0x7f) r0 = socket$inet(0x2, 0x80003, 0x2) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0xf17, 0x4) poll(&(0x7f0000000000)=[{r0}], 0x1, 0xfffffffa) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x10) [ 790.998413] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 791.022533] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 791.033896] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 791.048185] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 00:47:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000180)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) getdents(0xffffffffffffffff, 0x0, 0x0) write$ppp(0xffffffffffffffff, &(0x7f00000002c0), 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r4, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r5, &(0x7f0000007680)={0x0, 0x5f, &(0x7f0000000140)={&(0x7f00000075c0)={0x1c, r6, 0xb631c6b8429a7eb, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)={0x44, r6, 0x2, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_INTERVAL={0xfee6, 0x39, 0x6}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xffffffff}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x10200}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xfff}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffff7}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x20004080) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x2005}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000004080)) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) r8 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x12, r8, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r7, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, r9}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 791.126207] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000080)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000000)={0x7a}) ioctl$VT_DISALLOCATE(r3, 0x5608) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r4, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f0000000140)="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") [ 791.182799] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 791.224198] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 791.254544] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 791.285055] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r3) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)={0x3, 0x0, &(0x7f00000000c0)=""/137, &(0x7f0000000200)=""/177, &(0x7f0000000000)=""/63, 0x1}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d40)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) getrusage(0x1, &(0x7f00000003c0)) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000180)=0xd4, 0x4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 00:47:10 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000080)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000000)={0x7a}) ioctl$KDSETMODE(r3, 0x4b3a, 0x2) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) sendto$inet6(r2, &(0x7f0000000080)="39a110", 0x3, 0x40, 0x0, 0x0) 00:47:10 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c000000100001040009000000000000000000002728379f45c50ddd9b9f8085f92eaa5cd1989d3bb912", @ANYRES32=r5, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x6}}, 0x1c}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="8ded22928bc4911ed2edcfa11282edb99228b64fb0aaea6809ffe2bbd9192e3aad762cb91ffb0062510f62e9ff936dbbe1ec8b5336eced3e10f20400"/73, @ANYRES16=r8, @ANYBLOB="02002bbd7000fddbdf250c00000008003c000100010005002e00000000000800340009000000050030000000000008003900ff0f000008002c000600000008003c0040000000050033000000000008003b0036000000"], 0x5c}}, 0x40004) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 791.900825] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 791.915793] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 791.933727] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:10 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='umask=']) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x280000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_INTERFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000000)={0x14, r2, 0xb0343aabd1184b87}, 0x14}}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x50, r2, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@NL80211_ATTR_KEY_SEQ={0x10, 0xa, "376524f50101000000000000"}, @NL80211_ATTR_KEY_SEQ={0x14, 0xa, "d57d07d8e62e5f8377ecaa6a915332c4"}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_TYPE={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4080}, 0x4000) [ 791.934725] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000800)=[{&(0x7f00000001c0)=""/235, 0xeb}, {&(0x7f00000002c0)=""/193, 0xc1}, {&(0x7f00000003c0)=""/142, 0x8e}, {&(0x7f0000000480)=""/102, 0x66}, {&(0x7f0000000500)=""/97, 0x61}, {&(0x7f0000000580)=""/160, 0xa0}, {&(0x7f0000000640)=""/155, 0x9b}, {&(0x7f0000000700)=""/142, 0x8e}, {&(0x7f00000007c0)=""/30, 0x1e}], 0x9, &(0x7f00000008c0)=""/131, 0x83}, 0x10002) sendmsg$IPCTNL_MSG_CT_GET_STATS(r2, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8848}, 0xc085) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x850, 0x0, 0x0) [ 791.989211] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 792.032816] ntfs: (device loop2): parse_options(): The umask option requires an argument. 00:47:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f00000000c0)={0x2ee, 0x40, 0x60, 0x800, 0x7, 0x8, 0x4, 0x2, {0x8, 0x10001, 0x1}, {0x7, 0x6, 0x1}, {0x7fff, 0x3f}, {0xb1f, 0x2f676bc, 0x1}, 0x0, 0x0, 0x1, 0x9, 0x0, 0xffffff0b, 0x4, 0x6, 0xef, 0x1, 0x80000000, 0x6, 0x0, 0x1, 0x3, 0x8}) r1 = socket$alg(0x26, 0x5, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x300, 0x0) bind$alg(r1, &(0x7f0000000740)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r2 = accept$alg(r1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000000)=0x3ff, 0x4) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYPTR, @ANYRESHEX, @ANYRESOCT], 0x31) readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000800)=""/4096, 0x20010485}], 0x1) sync_file_range(r3, 0x0, 0x9, 0x4) 00:47:10 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x288081, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/member\x00', 0x2, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) [ 792.100502] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:10 executing program 2: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000080)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000000)={0x7a}) ioctl$KDSETMODE(r3, 0x4b3a, 0x2) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) r2 = getpid() sched_setscheduler(r2, 0x5, 0x0) ptrace$cont(0xffffffffffffffff, r2, 0x4, 0x7ff) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000000)=0x1) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x8, 0xe5}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0x0, &(0x7f0000000440)) sendto$inet(r3, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000180)=0x41) sendto$inet6(r0, &(0x7f0000000200)="39a110c2fef95c355415c618fddfbfbcbc8ee8ffbc4e77144ee71ed188aad2eb013a8afa5d07f21fcb1ccada4044361820a587616a5eb080f7b5428c2b3abf828eafb1f89633485c71d1124fab115e803b971af97c4cc33b30b734e2c1c94300"/108, 0xfffffffffffffeb6, 0x849, 0x0, 0x0) 00:47:10 executing program 3: prctl$PR_SET_FP_MODE(0x2d, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001600)={0x0, 0x0}, &(0x7f0000001640)=0xc) syz_mount_image$iso9660(&(0x7f00000010c0)='iso9660\x00', &(0x7f0000001100)='./file0\x00', 0x8, 0x9, &(0x7f0000001440)=[{&(0x7f0000001140)="9feca9d41bd50f86ec6f2455f8a0b3c4200836f84bf9192659e38f823d28eb3d88bbcd94127f43224fc3aee9d6b50edabffddd1ccc78c7425a1a69ce053dbe14f0da732266d0844b2cd95eab0ffaa0807f7fe27101114ccbb0a29592456dd0326a8d7f22794f718f6c965c232f526e414a747a7b6b34", 0x76, 0x1}, {&(0x7f00000011c0)="b5f5202349f70cf7d9001bfeff6a28e3061cb0385b770dd570dab0e4a169", 0x1e, 0x100000001}, {&(0x7f0000001200)="e3db68b5295e277ac0f2cd8b054d33eed8693a6a15fa7a", 0x17, 0x67}, {&(0x7f0000001240)="b26bce134cf667accff8abe36b1475d0760d1d75c627fc5666733fd9a7cd48a7d2b454ffc5ccfc6d2c08cbd5fc9707", 0x2f, 0x63f7}, {&(0x7f0000001280)="2f0fd0c90eff613363c697a67689dd0281b17ca7e99c504b9df325eb4c130b455a0e16c5164e7ebf5c48330d8f64d4b1cc15ca351e5ed98d89bfa27b84584ac4413bbfc944abed7bdd5d3f3ca2d0b5cfe61170abed0407ae3325d83841654744c722c557c2e1f3283c1dda4f0cb5034c09a78547f85928", 0x77, 0x9}, {&(0x7f0000001300)="fa992d174cd0922e574a4bb8aba82f5cddf37595192b69940447ac60ff78047c9dacece02f17c97bd49d5519c51c6d4c", 0x30, 0x5}, {&(0x7f0000001340)="6586da2f2b264c298188d94568", 0xd, 0x3}, {&(0x7f0000001380)="7e238101b4912638ae551f50f29999a8f646", 0x12, 0x8000}, {&(0x7f00000013c0)="af0a64cfa14c57548fe3e69e4f5927588c3f7453e294c6b8d8b7c4715a09d716cea13b3b4d21ec1b8d45cfebeff30fa391f447c1248b0010f2a4cbd5dae0ce7bcc261d265cd62fe9e96a3dfd46dcb36aca30f36d2842f57147abcac37a", 0x5d, 0x101}], 0x2202801, &(0x7f0000001680)=ANY=[@ANYBLOB='session=0x0000000000000004,map=normal,smackfsfloor(.:,uid>', @ANYRESDEC=r1, @ANYBLOB="2c6f626a5f757365723d2f6465762f6e766d652d66616272696373002c7365636c6162656c2c66756e633d46494c455f4d4d41502c736d61636b66736861743d7b70726f63a6656d302c657569643d", @ANYRESDEC=r2, @ANYBLOB=',\x00']) getsockopt$inet_mreqn(r0, 0x0, 0x60, 0x0, &(0x7f0000000040)=0x44) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x8e0) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x202400, 0x0) recvfrom$l2tp6(r3, &(0x7f0000000080)=""/4096, 0x1000, 0x1, &(0x7f0000001080)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}, 0x20) [ 792.243106] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 792.244226] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 792.290279] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000005c0)='./file0\x00', 0x0) fstatfs(r0, &(0x7f0000000400)=""/128) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x0, 0x0) sendto$unix(r1, &(0x7f00000002c0)="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", 0xfe, 0x1, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4000, 0x3) 00:47:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r3) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)={0x3, 0x0, &(0x7f00000000c0)=""/137, &(0x7f0000000200)=""/177, &(0x7f0000000000)=""/63, 0x1}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d40)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) getrusage(0x1, &(0x7f00000003c0)) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000180)=0xd4, 0x4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 00:47:11 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0x9, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x115e, 0x15000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}, 0x1398}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000005c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) mlock2(&(0x7f00003ff000/0x2000)=nil, 0x2000, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff0d5}], 0x8}, 0x3f00) creat(&(0x7f0000000100)='./bus\x00', 0x0) io_submit(0x0, 0x0, &(0x7f0000000540)) syz_open_procfs(0x0, 0x0) r3 = memfd_create(&(0x7f0000000000), 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400002, 0x0, 0x2011, r3, 0x0) [ 792.433003] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 792.465105] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:11 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000003c631084472d496cb4d14a32abf6100001040000000000859a0d204e284c3200000000000000815128b18c675cf70242e03e2f2039b0fceac442a82dbd34ae8922b733a6ae2ee7583f29d580be0fe96dfaafdc0d8efa2a1063fedee9c3d371abb60cc143c4a4184ea9154f0f1063ef", @ANYRES32=r5, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x6}}, 0x1c}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 00:47:11 executing program 3: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80000, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa74dd6032000e00442f00fe8000000000000000000000000000bbfe7fff2900000000000000009fade85c1978a1a8000088be00000000100000000100000000000000080022eb0000000020002600020000005800"/111], 0x0) 00:47:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) r2 = socket(0x2000000000000010, 0x3, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000b00)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000640)={0x454, 0x7, 0xa, 0x801, 0x0, 0x0, {0x7, 0x0, 0xa}, [@NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x2}, @NFTA_RULE_EXPRESSIONS={0x3cc, 0x4, 0x0, 0x1, [{0xcc, 0x1, 0x0, 0x1, [@osf={{0x8, 0x1, 'osf\x00'}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_OSF_TTL={0x5}, @NFTA_OSF_TTL={0x5, 0x2, 0xf7}, @NFTA_OSF_TTL={0x5, 0x2, 0x74}, @NFTA_OSF_TTL={0x5, 0x2, 0x57}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_OSF_TTL={0x5, 0x2, 0x6}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_OSF_TTL={0x5, 0x2, 0x5}, @NFTA_OSF_TTL={0x5, 0x2, 0x40}]}}, @redir={{0xa, 0x1, 'redir\x00'}, @void}, @connlimit={{0xe, 0x1, 'connlimit\x00'}, @val={0x4}}, @osf={{0x8, 0x1, 'osf\x00'}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_TTL={0x5, 0x2, 0x1}, @NFTA_OSF_TTL={0x5, 0x2, 0x9}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0xc}, @NFTA_OSF_TTL={0x5, 0x2, 0x3e}]}}, @osf={{0x8, 0x1, 'osf\x00'}, @void}]}, {0xc0, 0x1, 0x0, 0x1, [@quota={{0xa, 0x1, 'quota\x00'}, @val={0x5c, 0x2, 0x0, 0x1, [@NFTA_QUOTA_BYTES={0xc, 0x1, 0x1, 0x0, 0x800}, @NFTA_QUOTA_CONSUMED={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_QUOTA_CONSUMED={0xc, 0x4, 0x1, 0x0, 0x1ff}, @NFTA_QUOTA_BYTES={0xc, 0x1, 0x1, 0x0, 0xfffffffffffffffa}, @NFTA_QUOTA_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_QUOTA_BYTES={0xc, 0x1, 0x1, 0x0, 0x6}, @NFTA_QUOTA_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_QUOTA_CONSUMED={0xc, 0x4, 0x1, 0x0, 0xff}]}}, @queue={{0xa, 0x1, 'queue\x00'}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_QUEUE_TOTAL={0x6, 0x2, 0x1, 0x0, 0x3}, @NFTA_QUEUE_SREG_QNUM={0x8, 0x4, 0x1, 0x0, 0x14}]}}, @nat={{0x8, 0x1, 'nat\x00'}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_NAT_REG_PROTO_MIN={0x8, 0x5, 0x1, 0x0, 0x12}, @NFTA_NAT_TYPE={0x8}, @NFTA_NAT_REG_PROTO_MIN={0x8, 0x5, 0x1, 0x0, 0xb}, @NFTA_NAT_REG_PROTO_MIN={0x8, 0x5, 0x1, 0x0, 0x16}, @NFTA_NAT_REG_PROTO_MIN={0x8, 0x5, 0x1, 0x0, 0xd}]}}]}, {0x8c, 0x1, 0x0, 0x1, [@exthdr={{0xb, 0x1, 'exthdr\x00'}, @void}, @numgen={{0xb, 0x1, 'numgen\x00'}, @val={0x3c, 0x2, 0x0, 0x1, [@NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x10000}, @NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x3cf}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x5}, @NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x3}]}}, @synproxy={{0xd, 0x1, 'synproxy\x00'}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_SYNPROXY_WSCALE={0x5}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x8000}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x8192}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x7d}]}}]}, {0x78, 0x1, 0x0, 0x1, [@synproxy={{0xd, 0x1, 'synproxy\x00'}, @void}, @target={{0xb, 0x1, 'target\x00'}, @void}, @payload={{0xc, 0x1, 'payload\x00'}, @val={0x3c, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_BASE={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_PAYLOAD_BASE={0x8}, @NFTA_PAYLOAD_DREG={0x8}, @NFTA_PAYLOAD_LEN={0x8, 0x4, 0x1, 0x0, 0xfff}, @NFTA_PAYLOAD_CSUM_TYPE={0x8, 0x6, 0x1, 0x0, 0x1}, @NFTA_PAYLOAD_CSUM_TYPE={0x8}, @NFTA_PAYLOAD_CSUM_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}]}}, @synproxy={{0xd, 0x1, 'synproxy\x00'}, @void}]}, {0x138, 0x1, 0x0, 0x1, [@limit={{0xa, 0x1, 'limit\x00'}, @void}, @redir={{0xa, 0x1, 'redir\x00'}, @void}, @flow_offload={{0x11, 0x1, 'flow_offload\x00'}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz2\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz2\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}}, @dup_ipv6={{0x8, 0x1, 'dup\x00'}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0xc}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x14}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0xa}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x16}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x8}]}}, @rt={{0x7, 0x1, 'rt\x00'}, @void}, @dup={{0x8, 0x1, 'dup\x00'}, @void}, @tproxy={{0xb, 0x1, 'tproxy\x00'}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_TPROXY_FAMILY={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0x8}, @NFTA_TPROXY_FAMILY={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_TPROXY_FAMILY={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0x12}, @NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0xc}]}}]}]}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x3}, @NFTA_RULE_USERDATA={0x5f, 0x7, 0x1, 0x0, "81841762e50594733113dacfc46faf21af045b0f8c12399a47d20d8b5b4dcef7265d678854b4f00fa2e16a0988cdc1a7e70b97b7c9912eb5404c30d0d202fa3a418e84776ccc165791694c3f5544fd856c50a1592d95eb9a7bb099"}]}, 0x454}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) ioctl$sock_ax25_SIOCADDRT(r1, 0x890b, &(0x7f00000002c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @default]}) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYPTR, @ANYRES16=r3, @ANYBLOB="0308000000000800bc6692ba622c31d9dc02ee2f17d541d6702ac2bd2fa8eb9a6bb929075aa11938767978f36ccc7b30f8c281cd63c8634d4e7d2f176e990c2671a62a65a59cc8275b2545b966c42c50b6cfc0d09c669dc90d253130ee4f059aa56002a9d19fbfe8cd8926ecc4330d4435c08e64a06a0bfcc60feff7b2f3a47ef5ba25d2a9d3ab5fe6"], 0x3}}, 0x20000800) sendmsg$NFNL_MSG_COMPAT_GET(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, 0x0, 0xb, 0x5, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x9}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_NAME={0x9, 0x1, 'fuse\x00'}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_NAME={0x11, 0x1, ',system$ppp0\x00'}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x7}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8}, 0x40000) r4 = shmget(0x1, 0x4000, 0x80, &(0x7f0000ffa000/0x4000)=nil) shmat(r4, &(0x7f0000ffd000/0x1000)=nil, 0x3000) fgetxattr(r2, &(0x7f0000000380)=@random={'system.', '/dev/fuse\x00'}, &(0x7f0000000580)=""/192, 0xc0) 00:47:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000180)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) write$ppp(0xffffffffffffffff, &(0x7f00000002c0), 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f0000000580), 0xc, 0x0, 0x1, 0x0, 0x0, 0x2005}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/slabinfo\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @ipv4={[], [], @loopback}, 0x2}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000100)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000001c0)=0x24) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f00000003c0)={r7, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x18}}}, 0x9, 0xfffa}, 0x90) 00:47:11 executing program 5: fchdir(0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0x28, &(0x7f00000008c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r0, 0x0, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r0, 0x1, 0x18}, 0xc) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f00000002c0)={0x5, 0xc6, &(0x7f00000001c0)="ad9258435b6e061fc9e8ea1a9cc400682ca9697c628a9f1b77b3acd24fbf6d14e7a9b91d3ecc7b6ea1fb263135ce170035ad6212e5617f40fceb97fd1e7d63e94f811eec224620be05222aaa2a7d79f0897320c67718c1e2c1085371b57924bf7a85d855c55638d4ba7b661255ea0c07eed111ef0d1502808c32dc748bce407bf57026c5089d7771b755d9351a157624ae52a109b4a682842c64c3ab69a785076ae74b18506f8463558d3a285c62c95df6558a2111c43651e451d31222957b353e4f8f0513f0"}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) chroot(&(0x7f0000000300)='./file0\x00') bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e62, 0x0, @ipv4={[], [], @loopback}, 0x800000}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) ioctl$BINDER_SET_MAX_THREADS(r3, 0x40046205, &(0x7f0000000140)=0x4) listen(r2, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000280)) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) 00:47:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0xfffffffe}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r3, 0x8983, &(0x7f0000000140)) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f00000000c0)={0x10002, 0x0, &(0x7f0000ffb000/0x3000)=nil}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0xec, "7a8b3e7fdf020c49d4cfb71f326b6d8ad816f65095e14c9ab9785359d66f657ea8ef05da2535d239598ae2e08886917f36365cb35ece71122f8bc3994b007c9d10f8dd84d148adf9600e8baf6d488e2df9388c6504c72f8934dd73c2d2bae20069ec66618dab31ceb80185a6b42eac40af88629972908900d1136fb4de23bef4a074c2811875e14f5bc22fd5e748fd4418afee780c5a9a2ee7df0fc3ba8d319cf4cd6e86f970b23dcd297079d8bcf551dbfef885df4ed9a4a1c18533ad5dbccdc588fee5db68647d0490acbd6e2e74e63b4861a54e756ebe889facdffd711d74e95cff3aa482f083537fc104"}, &(0x7f0000000300)=0xf4) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000340)={r4, 0xc027}, 0xc) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000000)=0xe8) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c00000010000400"/20, @ANYRES32=r7, @ANYBLOB="00000000030e03001c0012800b0001006772657449bf86ef0c0002800600030000100000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x0) 00:47:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x29810}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000002c0)=0x4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000004c0)={'veth1_to_team\x00', 0x0}) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f00000001c0)={@dev}, 0x14) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000040)={@remote}, 0x14) setsockopt$inet6_mreq(r4, 0x29, 0x1c, &(0x7f0000000000)={@dev, r5}, 0x14) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x800000000, 0x200, 0x0, 0x5, 0x19, 0x8, "c07e02328bbf618257fe84207f9bd1f5fad177ed911a43c5953a32952136ccd71eada67d5de91b7e91e3d3765377f198cc4f3f55b56c666a5e6e814cb2eed918", "f757807ec7c01412840a01879116ae2afff9491276048829e21cdb282f775ef91f94a7c4c1796141070afa20f82d08337f015356f0906aac095e8c496846c642", "0c47b76cc356dbb3784a2c026e86b7aef5647188f65a6be1b7ce9f84dca3a6b8", [0x3, 0xffffffffffffffc1]}) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x42c02, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r6, 0x4010aeab, &(0x7f0000000280)={0x80000001, 0x3000}) r7 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000300)='/dev/bsg\x00', 0x208380, 0x0) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000340)=@gcm_256={{0x304}, "737acf32caefcf24", "beb0d9b8789426c3a7cf0206966c17be7259f81a34d4839022ac89dc799acbe7", "be57c0ba", "fef1bd59819d6f75"}, 0x38) 00:47:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) chdir(&(0x7f00000000c0)='./file0\x00') pipe(0x0) r2 = getpid() sched_setscheduler(r2, 0x5, 0x0) ptrace$cont(0xffffffffffffffff, r2, 0x4, 0x7ff) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000000)=0x1) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x8, 0xe5}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0x0, &(0x7f0000000440)) sendto$inet(r3, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000180)=0x41) sendto$inet6(r0, &(0x7f0000000200)="39a110c2fef95c355415c618fddfbfbcbc8ee8ffbc4e77144ee71ed188aad2eb013a8afa5d07f21fcb1ccada4044361820a587616a5eb080f7b5428c2b3abf828eafb1f89633485c71d1124fab115e803b971af97c4cc33b30b734e2c1c94300"/108, 0xfffffffffffffeb6, 0x849, 0x0, 0x0) 00:47:12 executing program 2: socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'vlan1\x00', @ifru_settings={0x4, 0x80, @fr_pvc_info=0x0}}) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x891c, &(0x7f0000000080)={'veth1\x00', @ifru_flags=0x2}) 00:47:12 executing program 5: fchdir(0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000140)={0x4, 0x6, 0x4, 0x400000, 0x0, {0x77359400}, {0x5, 0x8, 0xff, 0x2c, 0xe1, 0x3, "4523ecd7"}, 0x8, 0x4, @offset=0x10000, 0x2}) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 793.434257] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 793.515827] QAT: Invalid ioctl 00:47:12 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x6}}, 0x1c}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r8 = geteuid() r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r10) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x5, 0x8, &(0x7f0000000800)=[{&(0x7f0000000340)="6a90d1f33ef0b16a52092313fa4a921d136dfc9a5df7946f4f03596bab8dcdca197d2717018430a40b", 0x29, 0x7ff}, {&(0x7f0000000380)="d1dd2ab0651a46dd35e4e88c5b8193829c6ed33c9305a7d8f8ff5ba7728f8c15cd2c3bd52219d7926a4f7c7e8a2e76dcee95151112af618e07e200c3952673f4737a2dbdd8f0011162e492d7d6df5cfb6dca51cb0581134219da7384b2ca744643e7bfe11ce469037eaddab2b24637cac0922a9737201aa2887dcc4bfdaea229df74033a3561537339a55974897305ad2da0bead2e52a97306342433cb68a20aa3d40fb8999c", 0xa6}, {&(0x7f0000000440)="d0daf6bce8fa39a08e0702ba7265c0b992f66f05638756b4b0785cbe9f6f557e582b5887a47ff88a5ac6b66494c38daef2876e7568dfe9afa73e815e031b8237c54777a2d252537a565d433147f4b6d73a25ae2faa809bd5a963204fd7e2d4c9e609bd655355dcad2f3b31e918273b4cffba09", 0x73, 0xda}, {&(0x7f00000004c0)="b3c2151c79385fb86e4e4f029989dbb0ff6b43c19f933d46c0fc7ab8d7bac002fcc3f77882565d7ac02a93d2eea091983f5bae5b9cd86e18acef270c667905c7b195a4cfdb8678c41170745987e63987f3e1eca9a860ea010985ee739f07d2569776537b8fecfdbda1dac9a27123134776a1576a5409d17d08212ba57609ef476f22187ddf6db35856e5e208d5fea5823f288bbc99a8a17c56f51b88c9db39", 0x9f, 0xaf}, {&(0x7f0000000580)="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", 0xfb, 0x400}, {&(0x7f0000000680)="1046a78598de3ebf217fbee231cf13f2929deb2b1552decd7f09db1b2f070b27ad48a1b0b473e5fc18da4068dc92471b2d6d361fa20605e6873fe52d50c436b4cb27c7dc6a36c62bc595e99e859570940317f9d81abfb82a97fbd961fed0ef5794b80fd529f1ef83538c6862d95b0b967feefb6e75b4089bca90b668a99f58f5b09f377c5c35a1c0e697e53f42123ab2ad2beb8a8cc0d551a706c6d563bc88a0ad39bca144300defeb02cb9c46e3fb21701305876e4f5e9bf2fcc1309c", 0xbd, 0x5}, {&(0x7f0000000740)="2455e3f75cd58436f88d71bd373b830458e3366c9e4c85dae42964cb7b96eef546cdb19a2b4737088ca9969be7c4172e0a9e0973e5398a3e05e993d6cdc00acb39222f08b5672cdcbea2eaafc5e29d3ffbec59ceac1f3c60bdfa728415a6e461cd6d", 0x62, 0x5}, {&(0x7f00000007c0), 0x0, 0x8}], 0x40010, &(0x7f0000000980)={[{@session={'session', 0x3d, 0xffffffff}}, {@part={'part', 0x3d, 0x9b8}}], [{@smackfsdef={'smackfsdef'}}, {@uid_lt={'uid<', r8}}, {@subj_type={'subj_type', 0x3d, '@vboxnet0'}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x38, 0x35, 0x39, 0x38, 0x31, 0x34, 0x65], 0x2d, [0x61, 0x35, 0x31, 0x36], 0x2d, [0x36, 0x63, 0x35, 0x62], 0x2d, [0x30, 0x62, 0xf, 0x34], 0x2d, [0x33, 0x38, 0x36, 0x35, 0x37, 0x37, 0x36, 0x31]}}}, {@fowner_eq={'fowner', 0x3d, r10}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'keyring*'}}, {@measure='measure'}, {@uid_lt={'uid<', r11}}]}) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 793.572452] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 793.627606] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 793.657756] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 00:47:12 executing program 2: read$char_usb(0xffffffffffffffff, &(0x7f0000000040)=""/102, 0x66) r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x14, r3, 0x303ec4fb0f74139}, 0x14}}, 0x0) close(r2) r4 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0x0) splice(r1, 0x0, r2, 0x0, 0x4ff60, 0x0) 00:47:12 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x2100, 0x0) write$P9_RRENAMEAT(r2, &(0x7f0000000180)={0x7, 0x4b, 0x1}, 0x7) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 793.695592] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:12 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000180)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) write$ppp(0xffffffffffffffff, &(0x7f00000002c0), 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f0000000580), 0xc, 0x0, 0x1, 0x0, 0x0, 0x2005}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/slabinfo\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @ipv4={[], [], @loopback}, 0x2}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000100)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000001c0)=0x24) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f00000003c0)={r7, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x18}}}, 0x9, 0xfffa}, 0x90) [ 793.804633] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:12 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) write$rfkill(r0, &(0x7f0000000080)={0x9, 0x6, 0x3, 0x1, 0x1}, 0x8) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) sendto$inet6(r3, &(0x7f0000000140)="b39349ef4499fa11896e72", 0xb, 0x40, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 793.873100] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 793.939715] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 794.012907] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:12 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, 0x8, 0x6, 0x3, 0x0, 0x0, {0x3, 0x0, 0x4}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x64}, 0x1, 0x0, 0x0, 0x6eede4865a557c3a}, 0x4800) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000002c0)) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:13 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x8ce) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 794.244513] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 794.266198] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 794.277551] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 794.305003] QAT: Invalid ioctl 00:47:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9000000010000000000000000032ddfff0000000", @ANYRES32=0x0, @ANYBLOB="b5219e770a00000008000a00", @ANYRES32=0x6, @ANYBLOB="6800120008000100677265005c00020008000400ac1414bb08000600ac1414aa08000600a9fe15bb08000700ac1414aa080007000000000008000700ac1e010108000a000100000008000300ab0000001800020003000000080011004e24000008000600ac1e000100e4ca15e4c1b4defe4ee63386ba6dbe7d8c06a0c141d534889ac012510fcc533a68ee57c9c647f77b7e99575c91dc242e682bca183ea3b5d016a763a73348817e8d67663dc92e4362cd6f59ec0f3d9d636d7d7df789dfb541bda4ddd0837b4146bdadeb1a2d8bf689053ec0ee1950619d55502562c920fb20a2b81aaa485616f19f6782f358d205913cf3ed9afda01943841d6fda2cd320595b781c672062e2047158d54ed00c030acc9e27f0bc9e142800cd91ba7fdad3994b8ce213355fa195fd005deb1fb04e3d2f09375b2ba23ae1750df5622b09", @ANYRESDEC=0x0], 0x6}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 00:47:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000140)={0xa, 0x20004e22, 0x0, @loopback, 0x5}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:13 executing program 3: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x3, 0x68a2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x1, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0xc4, r3, 0x800, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}]}, @TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xf8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x81}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK={0x5c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xf0000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x40}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x80000001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8000}, @TIPC_NLA_CON_FLAG={0x8}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x40000}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x0) remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) statx(r0, &(0x7f0000000300)='./file0\x00', 0x100, 0x400, &(0x7f0000000340)) 00:47:13 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8000, 0x280000) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) preadv(r1, &(0x7f00000017c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000140)) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1333, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_tcp_int(r4, 0x6, 0x4000000000014, &(0x7f0000000000)=0x80000000002, 0xe3) recvmmsg(r4, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000002c0)={r5, 0x1, 0x6, @dev={[], 0x1f}}, 0x10) setsockopt$inet_mreqn(r4, 0x0, 0x20, &(0x7f0000000100)={@multicast1, @empty, r5}, 0xc) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000200)={@ipv4={[], [], @broadcast}, 0x5c, r5}) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) open$dir(&(0x7f00000001c0)='./file0\x00', 0x22002, 0x4) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r6, 0x80045500, &(0x7f0000000240)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:13 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x6}}, 0x1c}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r8, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_tcp_int(r8, 0x6, 0x4000000000014, &(0x7f0000000000)=0x80000000002, 0xe3) recvmmsg(r8, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000002c0)={r9, 0x1, 0x6, @dev={[], 0x1f}}, 0x10) setsockopt$inet_mreqn(r8, 0x0, 0x20, &(0x7f0000000100)={@multicast1, @empty, r9}, 0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@dev={0xfe, 0x80, [], 0x3b}, @in6=@dev={0xfe, 0x80, [], 0x3b}, 0x4e22, 0x95e6, 0x4e24, 0xc, 0xa, 0xa0, 0xa0, 0x73, r9, 0xee00}, {0x4, 0xffffffffffffffff, 0x2, 0x42a, 0x412a, 0x3, 0x378, 0x1e9}, {0x5, 0x4, 0x4, 0x42}, 0x81, 0x6e6bbc, 0x0, 0x1, 0x1, 0x1}, {{@in=@loopback, 0x4d2, 0xff}, 0x2, @in6=@rand_addr="8c03aaf917699219d1e377e3df5ed5d7", 0x0, 0x2, 0x2, 0x0, 0xfffffffc, 0x9, 0x6}}, 0xe8) [ 794.504079] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 794.555045] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 00:47:13 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) r0 = dup(0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) fstat(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x140010, &(0x7f0000000500)={[{@mode={'mode', 0x3d, 0x5af19325}}, {@mode={'mode', 0x3d, 0xcbf}}, {@mode={'mode', 0x3d, 0xff}}, {@mode={'mode', 0x3d, 0x7f}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x3f}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode'}}], [{@uid_lt={'uid<', r1}}, {@dont_measure='dont_measure'}, {@subj_role={'subj_role', 0x3d, 'mountinfo\x00'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@euid_lt={'euid<', r4}}, {@obj_user={'obj_user'}}]}) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r6, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r7, &(0x7f00000017c0), 0x199, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) r11 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r10, r11, &(0x7f0000000040)=0x1, 0xe0) r12 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r12, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001100)={r13}, &(0x7f0000001140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r11, 0x84, 0x6d, &(0x7f0000000280)={r13, 0x36, "ac6a82d2b5acd821e04d0478a474e9c2be3b387e029887626c7e3cf456672c29c8210efff7d4d24bdf54e0b4d427ae9a6873dd3c164e"}, &(0x7f00000002c0)=0x3e) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r9, 0x84, 0x1b, &(0x7f00000006c0)=ANY=[@ANYRES32=r13, @ANYBLOB="1100000090853765c83c5b957d260a95d7a6c8243babf0a5269ac55869dd0faab89d8b09dc080edf0d7a0bcfcbbebc391f1d89101e19788d27d7880b50005efaa5fae0e162d4f5f6c3b85ec128a2dc87792e812effb21b735ce366e86e879ceb91375670525d557523f1d5fd5c49e679fa1e9d4ab136629a08d8c8656b64c7818b74371637646572d0989af5b5d38a576b77ffbd875ec6ca7d9d52afa2c3f48454aa09250ce4c550418ac99b9067fc3de8a57ad61ea2d4bdcfb5b8ede154079fd859"], &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r7, 0x84, 0x70, &(0x7f0000000140)={r13, @in={{0x2, 0x4e23, @multicast2}}, [0x800, 0xfffffffffffffff7, 0x4, 0x9, 0x3, 0x946a, 0x3, 0x8, 0x8, 0x3f, 0x0, 0x10001, 0x1, 0x401, 0x72]}, &(0x7f0000000240)=0x100) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000280)={r14, 0x100}, 0x8) sendto$inet6(r5, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:13 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r0, &(0x7f0000847f95), &(0x7f000089b000)}, 0x3a8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = msgget(0x3, 0x200) msgrcv(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000001000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005488b393a86c1b7b33ac2b46849bb910a9b345f4f4d668901729aae6e36c2fb7b51b541e0ee181bf6c25a7958372b90334c7fb52c49461a387d4257c74545dbdb880a61e5e422e75057926944921976eb0dba6e8c9914b8cfeaa04a65ac196517fb01291656b21addf14dfc79fde2a1f27a511878ac7ca00070b0995153695256295a6c76b63b9c75bd6"], 0x5c, 0x3, 0x3000) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820004, 0x0, 0x0, [0x0, 0xeca7020000000000, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x2c) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:47:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000140)={r3}) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000180)={0x16, @remote, 0x4e24, 0x0, 'sed\x00', 0x14, 0x4, 0x25}, 0x2c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:13 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280), 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000300)={0x7, 0x0, 0x100a, 0x1, 0x3, {0x8, 0x80000000}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbbf4}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x8}]}, 0x1c}}, 0x0) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)={0x34, 0x0, 0x1, 0x0, 0x0, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @dev}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_PEER_ADDRESS={0x8, 0x4, @broadcast}, @GTPA_MS_ADDRESS={0x8, 0x5, @broadcast}]}, 0x34}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x1d, 0x803, 0x1) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xffc7}}, 0x0) getsockname$packet(r4, 0x0, &(0x7f0000000200)) r5 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r5, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl(r5, 0x400, &(0x7f00000002c0)="45caeee0c84008366ef2ef3ae0a01ecbb4ef3b034c0325eac1ea5b0c1c3f77ad93032e26222256031603b5d231a8c4034f0e27f9ca") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={@rand_addr="51167d89eb1b870dd49a376400", @dev, @rand_addr="ee5974510000000a00"}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={@local, @rand_addr="6409c0b80e989ba29fb30dc012b97603", @ipv4}) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@GTPA_I_TEI={0x8}, @GTPA_LINK={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000880}, 0x8000) [ 794.649488] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 794.702800] selinux_nlmsg_perm: 389 callbacks suppressed [ 794.702813] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4741 comm=syz-executor.4 [ 794.725169] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:13 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000300)={'veth0_macvtap\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}) socketpair$unix(0x1, 0x1, 0x0, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x400000, 0x0) ioctl$PPPIOCGDEBUG(r3, 0x80047441, &(0x7f0000000040)) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r4, 0x10e, 0x5, 0x0, &(0x7f0000000100)) socket$packet(0x11, 0x2, 0x300) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r5, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r6 = dup2(r1, r5) r7 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r7, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r8 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x1e1002, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r9, &(0x7f00000017c0), 0x199, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r10, &(0x7f00000017c0), 0x199, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r7, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, r8, 0x300, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20040080}, 0x84910) mknod$loop(0x0, 0x80ffff00000000, 0xffffffffffffffff) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) utime(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)={0x8, 0x9}) ioctl$BLKPG(r6, 0x1269, &(0x7f00000000c0)={0x800, 0x6, 0x19, &(0x7f0000000080)="13123d1a2757ab73987611bd48930e26f15187503e96a333d3"}) epoll_create(0x401) 00:47:13 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) shmget(0x3, 0x2000, 0x1000, &(0x7f0000ffb000/0x2000)=nil) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 794.769300] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4741 comm=syz-executor.4 [ 794.815202] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 794.858540] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4741 comm=syz-executor.4 [ 794.879882] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 794.908712] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4741 comm=syz-executor.4 [ 794.929164] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:13 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000140)=0x5, 0x4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 794.968050] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4741 comm=syz-executor.4 [ 794.997651] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4741 comm=syz-executor.4 00:47:13 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, &(0x7f0000000040)=0x1, 0xe0) socket$inet_sctp(0x2, 0x1, 0x84) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r7, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001100)={r8}, &(0x7f0000001140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000280)={r8, 0x36, "ac6a82d2b5acd821e04d0478a474e9c2be3b387e029887626c7e3cf456672c29c8210efff7d4d24bdf54e0b4d427ae9a6873dd3c164e"}, &(0x7f00000002c0)=0x3e) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000000)={r8}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000140)={r8, 0x3, 0x10, 0x1ff, 0x6}, &(0x7f0000000180)=0x18) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000001c0)={r9, @in6={{0xa, 0x4e21, 0x3, @rand_addr="036165bcd2d469149370fa9b30f4c4ac", 0x4}}}, &(0x7f0000000280)=0x84) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r11, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r11, 0x0) sendto$inet6(r10, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r10, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r10, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r10, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 795.040896] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4741 comm=syz-executor.4 [ 795.063195] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4741 comm=syz-executor.4 [ 795.087392] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4741 comm=syz-executor.4 [ 795.104663] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 795.128897] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000180)=0x81, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000001c0)={@dev={0xfe, 0x80, [], 0x34}, 0x6, 0x2, 0x1, 0x2, 0x100, 0x4}, &(0x7f0000000200)=0x20) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 795.144444] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 795.160671] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4741 comm=syz-executor.4 00:47:13 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280), 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000300)={0x7, 0x0, 0x100a, 0x1, 0x3, {0x8, 0x80000000}}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbbf4}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x8}]}, 0x1c}}, 0x0) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)={0x34, 0x0, 0x1, 0x0, 0x0, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @dev}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_PEER_ADDRESS={0x8, 0x4, @broadcast}, @GTPA_MS_ADDRESS={0x8, 0x5, @broadcast}]}, 0x34}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x1d, 0x803, 0x1) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xffc7}}, 0x0) getsockname$packet(r4, 0x0, &(0x7f0000000200)) r5 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r5, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl(r5, 0x400, &(0x7f00000002c0)="45caeee0c84008366ef2ef3ae0a01ecbb4ef3b034c0325eac1ea5b0c1c3f77ad93032e26222256031603b5d231a8c4034f0e27f9ca") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={@rand_addr="51167d89eb1b870dd49a376400", @dev, @rand_addr="ee5974510000000a00"}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={@local, @rand_addr="6409c0b80e989ba29fb30dc012b97603", @ipv4}) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [@GTPA_I_TEI={0x8}, @GTPA_LINK={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000880}, 0x8000) [ 795.211950] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 795.281797] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 795.306906] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:14 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000300)={'veth0_macvtap\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}) socketpair$unix(0x1, 0x1, 0x0, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x400000, 0x0) ioctl$PPPIOCGDEBUG(r3, 0x80047441, &(0x7f0000000040)) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r4, 0x10e, 0x5, 0x0, &(0x7f0000000100)) socket$packet(0x11, 0x2, 0x300) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r5, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r6 = dup2(r1, r5) r7 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r7, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r8 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x1e1002, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r9, &(0x7f00000017c0), 0x199, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r10, &(0x7f00000017c0), 0x199, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r7, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, r8, 0x300, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20040080}, 0x84910) mknod$loop(0x0, 0x80ffff00000000, 0xffffffffffffffff) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) utime(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)={0x8, 0x9}) ioctl$BLKPG(r6, 0x1269, &(0x7f00000000c0)={0x800, 0x6, 0x19, &(0x7f0000000080)="13123d1a2757ab73987611bd48930e26f15187503e96a333d3"}) epoll_create(0x401) 00:47:14 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x11, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=r2, @ANYBLOB="6cea798c584fafb89a42cf3b12efc3eeddb5f94b01d177e725589222a03e440385398f4309f50d4ae09a6552ee7302cd4fb98e715726a11d759867d0d20f4d1cf3384c60507dd721091aa940d08840e6487e0c8089389354df8918391b7f088fd25932b90bd75e61bdd88b805859fd264983be5c4a40a8aae9a3ffb249d50ee1e86ea1476538ca09eea4fb8af695319ae17854d6f25ecf04f6", @ANYRESDEC=0xee01, @ANYBLOB=',default_permissions,max_read=0x0000000000000005,max_read=0x0000000000000001,max_read=0x0000000000000006,blksize=0x0000000000000400,blksize=0x0000000000000000,blksize=0x30385dfff1ad7587,allow_other,smackfsfloor=,audit,appraise_type=imasig,smackfsfloor=tls\x00,obj_user=mountinfo\x00,\x00']) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @rand_addr="0b1608600caf9400", 0xd5}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) ioctl$SIOCNRDECOBS(r5, 0x89e2) sendto$inet6(r3, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) execveat(r5, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)=[&(0x7f0000000480)='appraise_type=imasig', &(0x7f00000004c0)='\x00'], &(0x7f00000005c0)=[&(0x7f0000000540)='smackfsfloor', &(0x7f0000000580)='wlan0#\x00'], 0x1000) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000140)={0x5, 0x6, 0x20, 0x97, 'syz1\x00', 0xcc}) 00:47:14 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000000)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8) socket$inet(0x2, 0x3, 0x2) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) socket$inet(0x2b, 0x1, 0x0) r5 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000040)={0x2, 'gre0\x00'}, 0x18) 00:47:14 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c0000001000001000000000000005efa49b7fc30000000000", @ANYRES32=r5, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x6}}, 0x1c}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 00:47:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f0000000140)="39a110cee2d6cd98cb4e7a072f4b93d9a04d1b69d5b1b4c96dc21f8d4daa2526f0c2587fc1d6489c249695", 0x2b, 0x40, 0x0, 0x0) 00:47:14 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0xb) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:14 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x2f) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) stat(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) lstat(0x0, 0x0) stat(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x400020000000010, 0x2, 0x0) r4 = dup2(r2, r3) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) setresuid(0xee01, r8, 0x0) setresuid(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 00:47:14 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/enforce\x00', 0x102000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f00000009c0)={0x5, 0x3f, 0x5, 0x0, 0x1, 0x6, 0x0, 0x80, 0x73, 0x4, 0x7, 0x5, 0x0, 0x5, 0x2, 0x80, 0x3e, 0x6f, 0x4, [], 0x9a, 0xac9d}) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x180) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000380)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x28fa9, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYBLOB="01100000000000002c00120009000100766c616e000000001c000200100002000c0001000900000000000000060001000000000008000500", @ANYRES32=r6, @ANYBLOB], 0x54}}, 0x0) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="039b2dbd7000fbdbdf25fc07634e688918340000000000000000000000000000000108000b00", @ANYRES32=r6, @ANYBLOB="04000500"], 0x34}, 0x1, 0x0, 0x0, 0x8011}, 0x1) r7 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @loopback, @initdev}, &(0x7f0000000400)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000440)={'vxcan0\x00', r8}) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000840)={0x12c, 0x2, 0x2, 0x801, 0x0, 0x0, {0xa, 0x0, 0xa}, [@CTA_EXPECT_TUPLE={0x9c}, @CTA_EXPECT_HELP_NAME={0xf, 0x6, 'tftp-20000\x00'}, @CTA_EXPECT_TUPLE={0x6c}]}, 0x12c}, 0x1, 0x0, 0x0, 0x440c0}, 0x51) membarrier(0x1, 0x0) r9 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7ff, 0x101000) fcntl$addseals(r9, 0x409, 0x4) ioctl$EVIOCSABS0(r9, 0x401845c0, &(0x7f0000000040)={0x9, 0x46b, 0x4, 0x6, 0x6, 0x800}) [ 795.657200] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 795.686502] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r5, r6, &(0x7f0000000040)=0x1, 0xe0) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001100)={r8}, &(0x7f0000001140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r6, 0x84, 0x6d, &(0x7f0000000280)=ANY=[@ANYRES32=r8, @ANYBLOB="36000000ac6a82d2b5acd821e04d0478a474e9c2be20387ef456672c29c8210efff7d4d24bdf55e0b4d427ae9a6873dd3c164e"], &(0x7f00000002c0)=0x3e) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000000)={r8}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={r8, 0x3f}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r9, 0x200}, 0x8) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r10 = socket$can_bcm(0x1d, 0x2, 0x2) r11 = socket$nl_generic(0x10, 0x3, 0x10) accept4$llc(r10, 0x0, &(0x7f0000000200), 0x80800) getsockopt$netlink(r11, 0x10e, 0x5, 0x0, &(0x7f0000000100)) fcntl$dupfd(r10, 0x0, r11) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 795.733763] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 795.743024] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101, 0xfffffffffffffff8}, 0x4023, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x0, 0x0) bind$unix(r0, &(0x7f0000000640)=@abs, 0x6e) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) syz_mount_image$nfs4(&(0x7f0000000140)='nfs4\x00', &(0x7f0000000200)='./file0/f.le.\x00', 0x6, 0x8, &(0x7f0000000900)=[{&(0x7f0000000480)="370a0d9aaad18843f12cb240d27e449f440d2181aabdfdaf873488717a5aa44135b3fc83e789813c9619d650bb7f4195caefd23a6329ec00f1d55f9a2735699b0f1426512ff5f5cbfd1d6112620ff3b237d0bbc843492cdcf505949e2ff4fb324b43fd37c452de663eb506082bac3c2d325bb491d65515965a5b9717d7b7030667e5c091f7f9574b9471b9124da5e307d5de70eefa9f1956", 0x98, 0x6}, {&(0x7f00000006c0)="e055b6758218025e9059e4d5c3e406702086178c7bd8cd8c1b2bea626ac76a8b999183eb7abb20bb08e70e66373a4b26ef45da59f8e133c48c76870b5c178ff4f1ac40e1895658cbb62b1ae74ee7aae62cdb8c9baa65850b5e8745089f4f43fb2124a1fea4e71ea7f185904507a4bbe16390792614a9c56ebdedb2b5bed4a74fee80151848d33f5f770dc297990354adc923adfbbca008f788a75528d66fe1b31e6bc164c86d3be5d347d33dee37d312b9171e8ec96a1b34ca5c076791c868c8bb1b553bd8c23541b75484decc244cbecf", 0xd1, 0x7}, {&(0x7f0000000240)="10297795b44c919e2bc7f574f86dd21c24952181570c963068f4ae272b364bdff294c555f759a3b7efe3e009bd1318377075b1244bb4ab934c535efc54a5d8e569e6d750fedb787ff8cb354937c02b61e5e8097f53219885778337b742079695", 0x60, 0x6}, {&(0x7f00000003c0)="19f27ef2acc04771333e573fbebc581e020a9df92a1269c564be6a06bd3c4fa837a2c0bc26c554feb4a7e8b2d83f87d7db17b31cb3d9cdfaf17b2da60d936e85ec3a89f2cd6cb1dcdee0a152f5a49250", 0x50, 0x6bf}, {&(0x7f0000000540)="c58f210049afda64e1", 0x9, 0x8}, {&(0x7f0000000580)="faf9b8ae7438e68845ac242b594855bcf66a0e99f62c6b49c424b8399af25e25f60f4739100c070dc93cd7e596bfe5c9ecddf65926c88ef382abea0adfd16af629ffc851348e27681a9a2fd8225ad20efaf5bb", 0x53, 0x640c}, {&(0x7f0000000880)="17dc0ff6d7b7064d56efbf9ea94d0740f42c76094f5440b0dddf8f5095c0a6833e231fede07baa18a6b25480", 0x2c, 0x6}, {&(0x7f00000008c0)="8020560a249eec5c43c8ae3c5fe12a40e01247882158eed0efe1a65f61c79d26088324c629fe58c1137b4214c756bea340c9a142bfc8bdb94d37fe93e01ae091", 0x40, 0x4}], 0x2, &(0x7f00000009c0)='/dev/vsock\x00') r1 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, &(0x7f00000001c0)=0x1) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = open(0x0, 0x141042, 0x0) lseek(r4, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="556c3d2f43e3c3cde5224072d4a9893fc12373f38dfa027e9da1720400b754b2e6549c31c2687dad03b67ce87277fb91153273991f7399a8fca3558798e41c0a67da7de5e4cb5eac5fede18b55d7061c8f5e82216b15925f1133a2d0f4a21195015ef5f640554d074ed29b7c2871ccb1bde3c54ca8b17a8939762638d573ac67b613414f9dea2df8dbfbb93821411e9690397e4336a95afd239ce0a49ecb", @ANYRESHEX, @ANYRESHEX=r4, @ANYRESDEC=0x0, @ANYBLOB, @ANYRESOCT=0x0, @ANYBLOB]) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f00000001c0)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000c00)={0x5, 0x10, 0xfa00, {&(0x7f0000000a00), r5, 0x1}}, 0x18) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000600)='./file0/f.le.\x00', &(0x7f0000000800), 0x800) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, 0x0) socket$isdn_base(0x22, 0x3, 0x0) renameat(r6, &(0x7f0000000180)='.//ile0\x00', r6, &(0x7f00000007c0)='./file0/f.le.\x00') 00:47:14 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffbf, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x80800, 0x0) bind$bt_hci(r2, &(0x7f0000000200)={0x1f, 0x5}, 0x6) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000240), &(0x7f0000000280)=0xc) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 795.835295] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 795.859471] IPVS: sync thread started: state = BACKUP, mcast_ifn = gre0, syncid = 0, id = 0 [ 795.893298] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 00:47:14 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) write$P9_RREADDIR(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="2a0003002901005e0000000000000085fb0bc0c1d0f55e2569fd00"/42], 0x2a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x400020000000010, 0x2, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) lgetxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=@known='trusted.syz\x00', 0x0, 0x0) 00:47:14 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x80}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x7f, 0x801) ioctl$KVM_GET_PIT(r2, 0xc048ae65, &(0x7f00000002c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) clock_gettime(0x0, 0x0) write(r4, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ab64}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x5, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f0000000100)='uid_map\x00') r5 = socket(0x10, 0x2, 0xc) write(r5, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100040423dcffdf00", 0x1f) getsockopt$bt_BT_SECURITY(r5, 0x112, 0x4, &(0x7f0000000240), 0x2) mkdir(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) [ 795.934268] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 795.961259] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:14 executing program 5: fchdir(0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, &(0x7f0000000340)) write$binfmt_misc(r0, &(0x7f0000000200)={'syz0', "2ce807977e64e0d9c26a7cd5a08d2f70ca9cc3ed370e4f04b5e897ee50267a6019bad01e128375cc29a0cd6f4aa0f599d18cad4dd619d9f600cae3492d7b957c9b0bc7d3756575a81d54cc5d951e39b00f6c7c59aa525baa77ec456660f1ec2efdf2598c1e48f970b9be77c3d18240eafe902d222cad89012766f3945195ecc70296956c4201e28bb31bc3c881dbdbfd5dfaf0ea7d331512f9bb2df0f7ec"}, 0xa2) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x800) unlink(&(0x7f00000002c0)='./file0/file0\x00') openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) [ 796.019169] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:14 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfc, 0x0, 0xf73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="24000000180007841dfffd946f610500020f81001f038b050200080008001e004000ff", 0x23}], 0x1}, 0x0) socket(0x200000000000011, 0x4000000000080002, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) r0 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x1, 'veth1_to_bridge\x00', {}, 0xffff}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 796.153711] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 796.234712] Unknown ioctl -1054845647 [ 796.249060] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:15 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r4, &(0x7f0000000300), 0x0, 0x0) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f0000000140)) r5 = socket(0x2c, 0x1, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r6, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000005e00010000a700"/20, @ANYRES32=r6, @ANYBLOB="06000000"], 0x1c}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 00:47:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="25bca274769e020a2734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a782d2702e6d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x1000, &(0x7f0000000180)={[{@grpjquota_path={'grpjquota', 0x3d, '.'}}, {@errors_remount='errors=remount-ro', 0x58}]}) 00:47:15 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x2}, 0x16, 0x2) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00', 0x4000}) lsetxattr$trusted_overlay_origin(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket(0x10, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) close(0xffffffffffffffff) 00:47:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, &(0x7f0000000040)=0x1, 0xe0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001100)={r6}, &(0x7f0000001140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000280)={r6, 0x36, "ac6a82d2b5acd821e04d0478a474e9c2be3b387e029887626c7e3cf456672c29c8210efff7d4d24bdf54e0b4d427ae9a6873dd3c164e"}, &(0x7f00000002c0)=0x3e) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000000)={r6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000400)={r6, 0xe9}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000480)={r7, 0x100}, &(0x7f00000004c0)=0x8) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r8, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r9, &(0x7f00000017c0), 0x199, 0x0) r10 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x200e01, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r10, 0x110, 0x4, &(0x7f0000000140)=0x1, 0x4) sendto$inet6(r9, &(0x7f0000000180)="79a19898ec1bfa22c6fdb8a40000000000", 0x11, 0x24004088, 0x0, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) r13 = socket$nl_netfilter(0x10, 0x3, 0xc) r14 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r13, r14, &(0x7f0000000040)=0x1, 0xe0) r15 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r15, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001100)={r16}, &(0x7f0000001140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r14, 0x84, 0x6d, &(0x7f0000000280)={r16, 0x36, "ac6a82d2b5acd821e04d0478a474e9c2be3b387e029887626c7e3cf456672c29c8210efff7d4d24bdf54e0b4d427ae9a6873dd3c164e"}, &(0x7f00000002c0)=0x3e) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r12, 0x84, 0x1b, &(0x7f0000000500)=ANY=[@ANYRES32=r16, @ANYBLOB="00000000becb32bb94e6751222e8b44eebef1c6a336bfebf629ecc35352754530b8eb8dbfcde2fcb02a5b03faaa0abeada508303100c2cae72669885e407f2f9b7a2e5ede231a6e87dc490bf80bcb3bbbf8425f4c2a43591b510648b3584cb3045dc3c70b41c0fdeb2dc474fc1e7e83d8217d6cb77d70354fe4275d07c291859c9dc6f627d746b2bd4ccfd06d95895413eb9611042054fbcf60b0c47c7dda0885f92d435d9c750f6cb9ef160a4b7b509332316d954f5cbdc45250edff79bec79"], &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={r16, @in={{0x2, 0x4e23, @multicast2}}, [0x4, 0x5, 0xffffffffffffffe0, 0x9, 0xe4b, 0x6, 0x5, 0x5, 0x10001, 0x76, 0x6, 0x0, 0x78, 0x0, 0x8]}, &(0x7f00000002c0)=0x100) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r10, 0x84, 0x1f, &(0x7f0000000300)={r17, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x7fff, 0x9}, &(0x7f00000003c0)=0x90) 00:47:15 executing program 5: fchdir(0xffffffffffffffff) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x800200, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000180)={0xd, 0x400}) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:15 executing program 0: r0 = socket$inet6(0xa, 0x400000000005, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0x41c1, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x0, 0x10}, 0xc) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 796.552152] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 796.553018] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 796.586278] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 796.622613] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 796.634347] bridge0: port 1(bridge_slave_0) entered disabled state 00:47:15 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000140)={0x5, 0x2, 0x4, 0x800, 0x2000000, {0x77359400}, {0x5, 0x1, 0x4, 0x1f, 0x20, 0x7, "3bb1ee2f"}, 0x4, 0x1, @offset=0x40, 0x7, 0x0, 0xffffffffffffffff}) setsockopt$inet6_dccp_int(r2, 0x21, 0xb, &(0x7f00000001c0)=0x4, 0x4) [ 796.782013] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:15 executing program 3: ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000000180)={[0x4, 0x0, 0x5, 0x8, 0x4, 0x0, 0x400, 0x6, 0x23, 0x7, 0x7fffffff, 0x101, 0x6, 0x3, 0xf80, 0x2, 0xfff, 0x7ff, 0x2000400, 0x1c9, 0x7, 0x5, 0x7, 0x4, 0x9, 0x7f, 0x40, 0x200, 0x1, 0xbf36, 0x6, 0xfffffffa, 0x7ff, 0x1ff, 0x1000, 0x5, 0x3, 0x5, 0x9, 0x20, 0x9, 0x9, 0x1ff, 0x1f, 0x4546, 0xffe00000, 0xbb, 0x7, 0x1, 0x8, 0x3, 0x6, 0x2, 0x0, 0xf2, 0x81, 0x6, 0x0, 0x7, 0x80, 0x9, 0x4, 0x5, 0x2, 0x6, 0x4, 0x20, 0x52, 0x7, 0x20000, 0x3ff, 0x629, 0x5, 0x1, 0xfffff36c, 0x9, 0x9, 0x8, 0x10001, 0xfffffffd, 0x8, 0x0, 0x0, 0x5, 0x5, 0x101, 0x9, 0x6, 0x9, 0x0, 0x6, 0x2, 0x0, 0x7, 0x3, 0x2, 0x6, 0x0, 0x10000, 0x7e84, 0xffffffe1, 0xffffffff, 0x0, 0x5, 0xfffffffe, 0x0, 0x4, 0x5, 0x0, 0x81, 0x4c0, 0x4, 0x400, 0x4, 0x5, 0x1, 0x1f, 0x7, 0x1, 0x8, 0x4, 0x3, 0xe4, 0x9, 0x9, 0xcbd, 0x7, 0x8, 0x62, 0xf5, 0x0, 0x3, 0x4, 0x0, 0x7, 0x8, 0x6, 0x4, 0x4, 0x4, 0x7ff, 0x7fff, 0x2, 0xfe9e, 0xe8, 0x0, 0x6, 0x1, 0x1, 0x55, 0x1, 0xe0a, 0x7, 0x80, 0x5, 0x0, 0x800000, 0x5, 0x1, 0x3950, 0x80000000, 0x2ecb, 0x8000, 0x10000, 0x1, 0x80000000, 0x4, 0x1000, 0xcb2, 0x7fff, 0x8, 0x1f, 0x9, 0x3ff, 0x1, 0x9, 0x1f, 0x8, 0x64a, 0x80000000, 0x7, 0x7f, 0x690, 0x8c01, 0x400, 0x7, 0x4c9, 0x571f9607, 0xffffffff, 0x0, 0x2, 0x5, 0x7bda, 0x10001, 0x2e13, 0x20, 0x0, 0x800, 0x4, 0x1, 0x0, 0x5, 0xabb, 0x7fffffff, 0x8000, 0x800, 0x53b, 0x0, 0x2, 0x81, 0x2, 0x80000001, 0x3, 0x8, 0x8f84, 0xfffffc01, 0x8, 0x80, 0x101, 0x3, 0x7, 0x3, 0x3, 0x6e, 0x200, 0x2, 0xff, 0x3, 0x20, 0x1, 0x9, 0x1, 0x0, 0x24, 0x7fff, 0x8, 0x0, 0x7fff, 0x0, 0x4ca2, 0x5, 0x9, 0x1, 0xfffffffa, 0x7, 0x5, 0xd4, 0xffff, 0x2, 0x80, 0x1, 0x401, 0x0, 0x4, 0x2, 0x7, 0x5, 0x80000000, 0x401, 0xfff, 0x2, 0x5, 0x1, 0x1, 0x1000, 0x1, 0x7fffffff, 0x3, 0xffffffff, 0x311a, 0xceb3, 0x1f, 0x5, 0x2, 0x80, 0x80000000, 0x3f, 0xef2, 0x6, 0xfffff000, 0x7f, 0x4, 0x7, 0x9, 0x3ff, 0x5, 0xffff8000, 0x20000000, 0x2, 0x6b3, 0x8000, 0x40, 0xfff, 0x9, 0x1, 0x1, 0x2, 0xffffffff, 0x7, 0x3, 0x400, 0x8, 0x8, 0x5, 0x81, 0x4, 0x3, 0x4, 0x401, 0xffff, 0x947ad89, 0x5, 0xf578, 0x1, 0x2, 0x3, 0x769, 0x6, 0x9, 0x3ff, 0x8, 0x0, 0x2, 0x2, 0x6, 0x7f, 0x480d, 0x9, 0x80, 0x71fd, 0x10001, 0x4f9, 0x5, 0x45a8, 0x1ff, 0x1000, 0xfffffe01, 0x2, 0x6281, 0x101, 0x1, 0x3, 0xffffffff, 0xc4, 0xee62, 0x9, 0x5, 0x1ca, 0x80000000, 0x6, 0x3f, 0x4, 0x3, 0x1, 0x2, 0x2, 0x10001, 0x5, 0x0, 0x0, 0xfffffffc, 0x5, 0x8000, 0x71ffb432, 0x10001, 0x80, 0x35, 0x0, 0x2, 0x9, 0x3, 0x5, 0xfffffce0, 0x6, 0x4, 0x6, 0x6, 0xffff, 0x7, 0x9, 0x4, 0x6, 0xec, 0x3, 0x1, 0x200, 0x0, 0x8, 0x7, 0xfff, 0xfffffff7, 0x8, 0x2, 0x400, 0x2, 0x5, 0x6, 0x2, 0x4, 0x80000001, 0xcdd2, 0x81, 0x126, 0x1, 0x8, 0x8f, 0x0, 0x1, 0xfffffff8, 0x2, 0x3f, 0x1, 0x61e1, 0x8001, 0xc95, 0xfffffffe, 0x3, 0xee3, 0x5cc4, 0x6, 0x6, 0x7, 0x1, 0x20, 0xfffffff7, 0x40, 0x0, 0x80000000, 0x6, 0x8, 0x16e, 0x1f, 0x80000001, 0x2, 0x400, 0x3, 0x3ff, 0x7fffffff, 0x10001, 0x8001, 0x7, 0x200, 0x1ff, 0x800, 0xa29fe4d, 0x9, 0x1, 0x3, 0x20, 0x2, 0x80, 0x4, 0xe1d, 0x6, 0xd81, 0x3, 0x5, 0xf34, 0x51, 0x80000001, 0x0, 0x5, 0x9, 0x24380, 0x3ff, 0x5, 0x40, 0x8, 0x6, 0x0, 0x800, 0x7, 0x8, 0x7263, 0x2, 0x7e5, 0x3f, 0x5, 0x200, 0x3, 0x0, 0xedcd, 0x80000000, 0xffffffff, 0x8, 0x2, 0x9, 0x8000, 0x4, 0x7, 0x6, 0x7fffffff, 0x3, 0x3ce1e978, 0xeee, 0xffffffff, 0x3, 0xd05, 0x800, 0x7, 0x1, 0x9, 0x3ff, 0x7, 0x0, 0xffffff89, 0x5, 0x3c3, 0x40, 0x5, 0x4, 0x400, 0x8, 0x306, 0x98, 0x800, 0x7ff, 0x0, 0x0, 0x2, 0x6, 0x8001, 0x699, 0x20, 0x100, 0x7, 0x597, 0x2, 0x2, 0x80000000, 0x110e, 0x5, 0x7, 0x800, 0x4ba, 0x0, 0x81, 0x1, 0x3, 0xf2, 0x7, 0x1ff, 0x3, 0xc4b, 0x9, 0x7ff, 0x8, 0x2, 0xd132, 0xc8a4, 0x200, 0x7ff, 0x3ff, 0x0, 0x4e64de99, 0x4, 0xc68f, 0xffff, 0x5, 0x5, 0x0, 0x6, 0x7f, 0x8, 0xffff, 0x80000001, 0x6, 0x819, 0xfff, 0x10000, 0x2, 0x3, 0x3, 0x6f6e, 0x40, 0x80000000, 0x8, 0x30, 0x8, 0x8001, 0x6adba519, 0x9, 0xff, 0x1, 0xffffff80, 0x80000000, 0x0, 0x4, 0x9, 0x6, 0x2, 0x10001, 0x400, 0x1f, 0x4, 0x9, 0x9, 0x4ba, 0x7, 0x5, 0x1, 0x3f, 0x6, 0x3f, 0x6, 0x6, 0x6, 0x9, 0xffffffff, 0x101, 0x1, 0x4, 0xffff, 0x8, 0x8, 0x1, 0x6, 0x3, 0x8, 0x5, 0xfe, 0x5, 0x200, 0x6, 0x10000, 0x1f, 0x5, 0x7fffffff, 0x0, 0x9f, 0x20000000, 0x6, 0x3, 0x81, 0x4, 0x8, 0x232b63f8, 0x2, 0x3, 0x7, 0x5, 0x2, 0x7, 0x8000, 0x9b, 0x24a, 0x6, 0x7, 0x7, 0x5, 0xffff, 0x7, 0x0, 0x0, 0x1, 0x200, 0x5, 0x7fff, 0x9, 0x0, 0x400, 0x7e, 0x7, 0x7, 0x4, 0x9, 0x3, 0x5, 0x2, 0x6, 0xf9e, 0x1, 0x2, 0x1, 0x6, 0x9, 0x7, 0x10000, 0x2442, 0x402, 0xef, 0x4, 0x0, 0x9, 0x800, 0x0, 0x401, 0x2, 0x40, 0x7, 0x8000, 0x7fff, 0x8, 0x10000, 0x6, 0x8, 0x2ce, 0x1, 0x8, 0x0, 0x8000, 0x10000, 0x5, 0x10001, 0x0, 0x0, 0x50, 0x8001, 0x1, 0x3ff, 0x1, 0x6, 0x9, 0x401, 0x3, 0x4, 0x9, 0x0, 0x1, 0x8, 0x8, 0x81, 0x4, 0x9, 0x6, 0x800, 0x4, 0x5, 0x4, 0x5, 0x81, 0x4, 0x7fff, 0x7f, 0x200, 0x9, 0xa60a, 0x200, 0x0, 0x200, 0x34, 0x4, 0x84d, 0x8, 0x5, 0x6, 0x1, 0x7, 0x0, 0x7, 0x3, 0x1f, 0x5, 0x5bc, 0x1f58, 0x1ff, 0x1, 0x7, 0x6, 0x4, 0x6, 0x1, 0x81, 0x5975, 0x8, 0x3, 0x401, 0x7fff, 0x1, 0xfa400, 0x7, 0x1ff, 0x800, 0x40400000, 0x3, 0xfffffff9, 0x1, 0x1, 0x8, 0x29db, 0x80, 0x9, 0xffff, 0x5e, 0x0, 0xac7, 0xffffffff, 0x5d4e, 0x6, 0x3, 0x80000001, 0x0, 0x4, 0x4, 0x7f, 0x7, 0x800, 0x8, 0x9, 0x9, 0x1000, 0x6, 0x4, 0x80, 0x4, 0x7, 0x5, 0x9, 0x4, 0x101, 0x49a, 0xe8ad, 0x9, 0x7fffffff, 0x73a9, 0x9, 0x4, 0x7, 0x8, 0x3, 0x6, 0x8, 0x0, 0x1, 0x100, 0x101, 0x5, 0x3, 0x786, 0x5, 0x80000001, 0x4, 0x2, 0x9, 0x800, 0x5, 0x7ff, 0x7, 0x400, 0x3, 0xe262, 0x5, 0x5, 0xfffff800, 0x7fff, 0x0, 0x7, 0x1f, 0x6, 0x3, 0x36a, 0x9, 0x90, 0x0, 0x401, 0x99d1, 0x4, 0x3ff, 0x1, 0x1f, 0x7fff, 0x2, 0x0, 0x401, 0xfffffffc, 0x101, 0x0, 0xeb, 0x2f, 0xa, 0xc7a5, 0x5, 0x7, 0x0, 0x8, 0x25, 0x1, 0xbe7f, 0x2540, 0x7, 0xfffffa05, 0x3, 0x7, 0xb34, 0x590b3df4, 0x800, 0x4, 0x101, 0x8, 0x1, 0x10001, 0xa1d, 0x7ff, 0x10001, 0x4, 0x9a8, 0x10001, 0x5, 0x1f, 0x1b57, 0x5, 0xbcc3, 0x0, 0x3, 0x800, 0x2, 0x8, 0xff, 0x8000, 0x1, 0x4, 0x1, 0x5, 0xffffffff, 0x80000001, 0xfffffffc, 0x3f, 0x4, 0x7, 0x1, 0x5, 0xfff, 0x0, 0x6, 0xec01675c, 0x200, 0x2, 0x7, 0xca19, 0x9, 0x2a, 0x0, 0x200, 0xfffffffc, 0xfffffffb, 0x6969, 0x4, 0xfff, 0x7fff, 0x8, 0x9, 0x9, 0x4, 0x5674, 0x80000001, 0x5, 0x0, 0x80000001, 0x800, 0x800, 0xfffffff8, 0x40, 0x5, 0x1, 0x10000, 0x1000, 0x8, 0xe7, 0x4, 0x80, 0x1, 0x8000, 0x7, 0x71, 0xfff, 0x3, 0x0, 0x7, 0x400, 0x3ff, 0x3f, 0xf62, 0x0, 0x96fd, 0x6, 0x3, 0x1, 0x200000ed, 0x8, 0x6, 0x2, 0x9, 0x81, 0x6, 0x7ff, 0xa1be, 0x3f, 0x7fff, 0x81, 0x3ff, 0x9, 0x1, 0x1, 0x7a, 0xff, 0x2, 0x1, 0x8, 0x1, 0x7, 0x3, 0x7f, 0x2, 0x1ff, 0xfffffffd, 0xfffffffb, 0xcd09, 0x10000, 0x8000000, 0x0, 0x98, 0x7, 0xb7f, 0x3, 0x6, 0xffffd998, 0x20, 0x100, 0x2, 0x8, 0x20, 0x8001, 0x7, 0xffffff7f]}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0xfa66c434f3c598a3}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000140)={0x0, 'syzkaller1\x00', {0x3}}) close(r0) 00:47:15 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x2}, 0x16, 0x2) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00', 0x4000}) lsetxattr$trusted_overlay_origin(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket(0x10, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) close(0xffffffffffffffff) 00:47:15 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x1ff, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) connect$l2tp6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x7f, @loopback, 0x5, 0x2}, 0x20) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 796.828205] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:15 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x80000) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xfd}, 0x7}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f0000000200)={0x10000, {{0xa, 0x4e20, 0x3, @mcast1, 0x5}}}, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) sendmmsg(r1, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0, 0x0, 0x0, 0x0, 0x7}}], 0x400000000000107, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r3, 0xc018620c, &(0x7f0000000340)={0x3}) socket$inet6(0xa, 0x803, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@ipv4={[], [], @loopback}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0xc}, {0x0, 0x0, 0x0, 0x4}, {}, 0x3, 0x2, 0x0, 0x0, 0x2}, {{@in6=@empty}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1, 0x0, 0xfc, 0x0, 0x0, 0x2}}, 0xe8) socketpair(0x23, 0xa, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8982, &(0x7f00000000c0)={0x6, 'gre0\x00', {0x963}, 0x9}) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f00000002c0)) r6 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) socket$inet6(0xa, 0x803, 0x2) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)) [ 796.909728] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 796.948237] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:16 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6}}, 0x1c}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 00:47:16 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x2}, 0x16, 0x2) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00', 0x4000}) lsetxattr$trusted_overlay_origin(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket(0x10, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) close(0xffffffffffffffff) 00:47:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r2, &(0x7f0000000140)="0104b8450042e944def0c125cc13dde6a512739215a812b7af852d0a1ca3187ce9673eacf059f87ffb31bd8c39e23f06b4a8e6b9421690c75967c34607541fa6f3c692e2899fe996b5cb4e8c4c00ca8b98d2b77998996a2a2647cc17f69dacd46d1042eb53bee76e48071b0de0f07e7bd8a21c7ee87ad7e50e4f19d956c0be3095899aebe743296435787805258dfd854f77da54bb4d9bb20e9d3b18fc2abe68023d13e4a45683c7d6a31db9f910db2575bfacd3f74ed2e1ab73838ee9cce7a344536ea1303d7ef213e6f526d79225ffae05f12aa8e74e76c14013f5ef66fb98724c3a88e915ba", 0xe7, 0x8000, &(0x7f0000000240)={0xa, 0x4e21, 0x3, @mcast2, 0x6}, 0x1c) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "e79dfa2552aad340", "8f4d9fc12c7799fdc5d8567039e30555", "f0ced488", "b1dc07f8825022d7"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:16 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) accept4$llc(r4, &(0x7f0000000140), &(0x7f0000000180)=0x10, 0x0) listen(r0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000140)={0x5, 0x2, 0x4, 0x800, 0x2000000, {0x77359400}, {0x5, 0x1, 0x4, 0x1f, 0x20, 0x7, "3bb1ee2f"}, 0x4, 0x1, @offset=0x40, 0x7, 0x0, 0xffffffffffffffff}) setsockopt$inet6_dccp_int(r2, 0x21, 0xb, &(0x7f00000001c0)=0x4, 0x4) [ 797.458306] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 797.492622] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 797.515240] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:16 executing program 5: fchdir(0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fadvise64(r0, 0x8001, 0x1ff, 0x0) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) clock_gettime(0x0, &(0x7f0000000700)={0x0, 0x0}) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000740)={0x8, 0x2, 0x4, 0x20000000, 0x5, {r3, r4/1000+30000}, {0x0, 0x1, 0x0, 0x80, 0x7, 0x0, "0a19f5f0"}, 0xfffffff7, 0x3, @fd=r5, 0x4, 0x0, r2}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r6, 0x6, 0x21, &(0x7f00000007c0)="d2b2350c05ed87c7cc2d0414623e7f63", 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) [ 797.567033] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) add_key(&(0x7f0000000140)='.dead\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="9f60363bf874aa41ab4aaa3068ac7f943bf398e24c7ab2d6ffe0dce4b63ed739596d455bc3f3598225101b605bae5af83666f56cec1a50b15d02ec8f855e87f4ab5ef815e382f702c50753c0d0b28f747603797d1721b6859fb5e59bc3a11e106bd27a4811c29cbfd536a4884d909383367bf889205f7128e26ae734f63e9bce", 0x80, 0xfffffffffffffffb) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51450da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 797.621318] IPVS: stopping backup sync thread 4809 ... [ 797.658062] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 797.705853] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 797.717612] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 797.763546] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 797.791294] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 797.806391] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:16 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x2af202, 0x102) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000280)={0x20, 0x15, 0x7, 0x9, 0x1000, 0x7ff, &(0x7f0000000480)="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"}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e20, @remote}}, 0x0, 0x0, 0x2b, 0x0, "f2c218b5a62be54677458fcd2a8468264e88765714face102481bcc8587aa8925c3aa7724b154416aeb90271f88ef9a56af46cf9545a295d05f7df892974b0001db96f4cb98d80cae11e93531ed16986"}, 0xd8) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 797.843245] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 797.866930] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 797.915964] device bridge_slave_1 left promiscuous mode 00:47:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x90000, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r2, 0x10f, 0x85) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x304}, "45193d6a7997ab98", "a554d173525f327ad50a6c092521326f", '\x00', "1b83f358402b2389"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 797.948951] bridge0: port 2(bridge_slave_1) entered disabled state [ 797.974540] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 797.988784] device bridge_slave_0 left promiscuous mode [ 798.010833] bridge0: port 1(bridge_slave_0) entered disabled state [ 798.028231] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 798.062162] device veth1_macvtap left promiscuous mode [ 798.089193] device veth0_macvtap left promiscuous mode [ 798.115029] device veth1_vlan left promiscuous mode 00:47:16 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, &(0x7f0000000140)=0x2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 798.140262] device veth0_vlan left promiscuous mode [ 798.288189] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 798.386897] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 798.697861] device hsr_slave_1 left promiscuous mode [ 798.730405] device hsr_slave_0 left promiscuous mode [ 798.797045] team0 (unregistering): Port device team_slave_1 removed [ 798.852738] team0 (unregistering): Port device team_slave_0 removed [ 798.912488] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 798.944298] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 798.982340] bond0 (unregistering): Released all slaves 00:47:19 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') eventfd(0x6) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000040)=""/128) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28, 0x10, &(0x7f0000000000), 0xfeb6}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), 0x0) 00:47:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_tcp_int(r3, 0x6, 0x4000000000014, &(0x7f0000000000)=0x80000000002, 0xe3) recvmmsg(r3, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000002c0)={r4, 0x1, 0x6, @dev={[], 0x1f}}, 0x10) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000100)={@multicast1, @empty, r4}, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00', r4}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000180)={@rand_addr="615bf0b47d21e14ca5b547d5f9a3f456", 0x4e, r5}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 800.920827] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 800.943339] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 801.108774] IPVS: ftp: loaded support on port[0] = 21 [ 801.187642] chnl_net:caif_netlink_parms(): no params data found [ 801.227489] bridge0: port 1(bridge_slave_0) entered blocking state [ 801.234105] bridge0: port 1(bridge_slave_0) entered disabled state [ 801.241441] device bridge_slave_0 entered promiscuous mode [ 801.248347] bridge0: port 2(bridge_slave_1) entered blocking state [ 801.254901] bridge0: port 2(bridge_slave_1) entered disabled state [ 801.261981] device bridge_slave_1 entered promiscuous mode [ 801.282169] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 801.291804] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 801.308285] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 801.315765] team0: Port device team_slave_0 added [ 801.321789] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 801.328895] team0: Port device team_slave_1 added [ 801.346110] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 801.352424] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 801.377757] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 801.388839] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 801.395274] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 801.420618] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 801.431361] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 801.439232] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 801.459782] device hsr_slave_0 entered promiscuous mode [ 801.465586] device hsr_slave_1 entered promiscuous mode [ 801.471924] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 801.478987] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 801.547148] bridge0: port 2(bridge_slave_1) entered blocking state [ 801.553548] bridge0: port 2(bridge_slave_1) entered forwarding state [ 801.560345] bridge0: port 1(bridge_slave_0) entered blocking state [ 801.566824] bridge0: port 1(bridge_slave_0) entered forwarding state [ 801.598974] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 801.605791] 8021q: adding VLAN 0 to HW filter on device bond0 [ 801.615449] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 801.624656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 801.631885] bridge0: port 1(bridge_slave_0) entered disabled state [ 801.638489] bridge0: port 2(bridge_slave_1) entered disabled state [ 801.648827] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 801.655211] 8021q: adding VLAN 0 to HW filter on device team0 [ 801.681433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 801.689363] bridge0: port 1(bridge_slave_0) entered blocking state [ 801.695950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 801.703034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 801.711028] bridge0: port 2(bridge_slave_1) entered blocking state [ 801.717451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 801.724995] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 801.733081] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 801.741023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 801.749016] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 801.758743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 801.771839] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 801.777889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 801.792098] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 801.800926] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 801.807662] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 801.818626] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 801.888321] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 801.898825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 801.934368] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 801.942342] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 801.949077] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 801.958802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 801.966437] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 801.975495] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 801.984285] device veth0_vlan entered promiscuous mode [ 801.996461] device veth1_vlan entered promiscuous mode [ 802.002313] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 802.011795] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 802.025534] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 802.035021] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 802.043107] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 802.051136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 802.061072] device veth0_macvtap entered promiscuous mode [ 802.067078] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 802.077027] device veth1_macvtap entered promiscuous mode [ 802.085861] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 802.096557] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 802.105745] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 802.115794] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.125247] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 802.135307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.144532] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 802.154470] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.163836] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 802.174292] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.183714] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 802.193509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.202788] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 802.212551] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.223377] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 802.234122] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 802.241427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 802.249466] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 802.259385] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 802.269608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.279139] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 802.289639] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.298815] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 802.308585] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.317819] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 802.327640] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.337124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 802.347202] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.356419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 802.366189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.376418] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 802.383469] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 802.392032] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 802.399776] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 00:47:21 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000001780)='/selinux/load\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x28800, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f00000000c0)=0x6142ebad) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x104, 0x1, 0x8, 0x401, 0x0, 0x0, {0xc, 0x0, 0x8}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x892f}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x34, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x400}, @CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x7f}, @CTA_TIMEOUT_DCCP_RESPOND={0x8, 0x2, 0x1, 0x0, 0xff}, @CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0xb8}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8884}, @CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x12b9}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7f}]}, @CTA_TIMEOUT_DATA={0x44, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x80000001}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xea5}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x3ff}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x401}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8}]}, @CTA_TIMEOUT_DATA={0x24, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7fff}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0xfffffff7}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x200}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000081) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000235dbd0c85777844732fb5dee04e005345364c696e75781200000000c4ff8b0601"], 0xff) 00:47:21 executing program 5: fchdir(0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x5, 0x0, &(0x7f0000000100)) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0}, 0x1c000, 0xffffffffffffffff, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r4, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0101000000000000000001000000440001000c00070000000000960000000c0006006c626c637200000008000b000a69700008000800000000000800090000000000080001000a0000000800050002000000"], 0x58}}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x78, r6, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7ffa}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5b}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4815}, 0x40000) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f0000000140)=""/3) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:21 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x6}}, 0x1c}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000003c0)={0xa30000, 0x101, 0x1, r0, 0x0, &(0x7f0000000380)={0x9909cf, 0xcce, [], @p_u8=&(0x7f0000000340)=0x6c}}) ioctl$SIOCGETLINKNAME(r7, 0x89e0, &(0x7f0000000400)) r8 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r9, &(0x7f00000017c0), 0x199, 0x0) getsockname$tipc(r9, &(0x7f0000000140)=@name, &(0x7f0000000300)=0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 00:47:21 executing program 3: r0 = socket(0x11, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8697071") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="d400000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e24000005001600020000000500170000000000050008000000000008000600ac14141908000700e000000108005edb311f06000000000008000700ffffffdf080005000000000006000e000001000006001100000000000500170000000000", @ANYRES32, @ANYBLOB="04001200080007007f00000108000700bf94a6a00800060000000000"], 0xd4}}, 0x0) fcntl$setlease(r0, 0x400, 0x2) 00:47:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e23, @multicast2}}, 0x0, 0x0, 0x19, 0x0, "ca993bff9ba7e8a7bfdd6d6d5ce4b7e84c71e4cd08e52dc4353effc17a0ca7a3a3ed3e86d8c285032029f47d02053ee341444bc05ed00b6453ff7b8f471eeb0a27fb2a523c7885d2c44016fe348eb608"}, 0xd8) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "bb274255be87a5e3", "b2b37d2af9256850126d565d5483a717", "1efcd986", "4a5dc5a0df96766e"}, 0x28) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) dup(0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000540)=[@in6={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0x66}, @in6={0xa, 0x4e21, 0x4, @mcast2, 0x1}, @in6={0xa, 0x4e22, 0xfffffffa, @empty, 0xfffffffa}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e20, 0x0, @remote, 0x8}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e23, @empty}], 0xa0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x44804, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0x1001, r3) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$clear(0x7, r4) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000340)=""/253, &(0x7f0000000440)=0xfd) 00:47:21 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x100, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xa0, 0x1, 0x9, 0x3, 0x0, 0x0, {0xc, 0x0, 0x6}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x2}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x2}}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0xc}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x5}, @NFCTH_STATUS={0x8}, @NFCTH_STATUS={0x8}, @NFCTH_TUPLE={0x58, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @rand_addr="e54aaf9277a2ab834d028ffc34cfb158"}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000040}, 0x20041080) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000280)={0x101, 0x1, 'client1\x00', 0xffffffff80000000, "6d05a686313d0bc4", "2dc7de23e0b91594b743357ede04cdcdb7a774b94a18d6bff3efb3c08a4c39b7", 0xfffffdc0, 0x9}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x88000, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_KEY(r2, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000400}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xb8, r3, 0x2, 0x70bd29, 0x25dfdbff, {}, [@NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY={0x24, 0x50, 0x0, 0x1, [@NL80211_KEY_SEQ={0x12, 0x4, "010d1bddd37113f76998c07b05ef"}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "0d2eb78b63"}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY={0x68, 0x50, 0x0, 0x1, [@NL80211_KEY_DATA_WEP40={0x9, 0x1, "9438f4e168"}, @NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_IDX={0x5, 0x2, 0x4}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "1b1cb933d9906fb5c4ee4aeebe"}, @NL80211_KEY_TYPE={0x8, 0x7, 0x1}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_SEQ={0x12, 0x4, "7ca632332fc3e7b0722e0a7d5d02"}, @NL80211_KEY_MODE={0x5, 0x9, 0x2}]}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4}, 0x22000000) r4 = dup(r2) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000540)='[\xf8keyringsystem^cpuset*\x00') r5 = fcntl$getown(r2, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000600)={{0x0, 0x1, 0x0, 0x5fa4, '\x00', 0xd28}, 0x0, 0x20000000, 0x3ff, r5, 0x8, 0xffff, 'syz1\x00', &(0x7f0000000580)=['[\xf8keyringsystem^cpuset*\x00', ')\x00', 'keyring\xddvmnet0\x00', '[\xf8keyringsystem^cpuset*\x00', '\x00', 'client1\x00', 'client1\x00', '%\x92\x00'], 0x55, [], [0x0, 0xe1, 0x5, 0x200]}) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000740)='/dev/qat_adf_ctl\x00', 0x202000, 0x0) ioctl$KVM_GET_REGS(r6, 0x8090ae81, &(0x7f0000000780)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r6, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x96e56bc7c7d9a02e}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, 0x0, 0x10, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040000}, 0x40) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000940)='/selinux/enforce\x00', 0x1, 0x0) ioctl$KVM_X86_SET_MCE(r7, 0x4040ae9e, &(0x7f0000000980)={0x100000000000000, 0x1, 0x1946, 0x8, 0x19}) r8 = syz_open_dev$vcsn(&(0x7f00000009c0)='/dev/vcs#\x00', 0xbf3, 0x10002) ioctl$KVM_SET_GUEST_DEBUG(r8, 0x4048ae9b, &(0x7f0000000a00)={0x20000, 0x0, [0x7, 0x8, 0x1, 0x4, 0x100000001, 0x100000000, 0x1f, 0x8]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000b00)=0x14) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x60, r3, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0x4}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r9}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x5}}, @NL80211_ATTR_MESH_CONFIG={0x1c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x8d}, @NL80211_MESHCONF_RSSI_THRESHOLD={0x8, 0x14, 0xffffffffffffff27}, @NL80211_MESHCONF_PATH_REFRESH_TIME={0x8, 0x9, 0x8}]}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}]}, 0x60}, 0x1, 0x0, 0x0, 0x40080}, 0x4000000) ioctl$KVM_GET_PIT2(r7, 0x8070ae9f, &(0x7f0000000c40)) recvmsg(r7, &(0x7f0000000e80)={&(0x7f0000000cc0)=@rc, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000d40)=""/59, 0x3b}], 0x1, &(0x7f0000000dc0)=""/168, 0xa8}, 0x2022) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r7, 0x114, 0xa, &(0x7f0000000ec0), 0x1) r10 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/vga_arbiter\x00', 0x8000, 0x0) r11 = syz_genetlink_get_family_id$batadv(&(0x7f0000000f80)='batadv\x00') sendmsg$BATADV_CMD_GET_HARDIF(r10, &(0x7f0000001040)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001000)={&(0x7f0000000fc0)={0x3c, r11, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3f}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x101}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xf0c2}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x91}, 0x5) ioctl$sock_ifreq(r7, 0x8991, &(0x7f0000001080)={'veth0_to_bond\x00', @ifru_hwaddr=@broadcast}) r12 = syz_open_dev$rtc(&(0x7f00000010c0)='/dev/rtc#\x00', 0x800, 0x141000) ioctl$RTC_UIE_OFF(r12, 0x7004) [ 802.462248] bridge0: port 1(bridge_slave_0) entered disabled state [ 802.528679] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 802.554890] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 802.570858] IPVS: persistence engine module ip_vs_pe_ [ 802.570858] ip not found 00:47:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0xc0002, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000640)=@abs={0x1, 0x0, 0x4e24}, 0x6e) r1 = socket$nl_generic(0x10, 0x3, 0x10) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, &(0x7f00000001c0)=0x1) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000480)={0x0, 0x6, 0x1800, 0x1, 0x4, 0x8, 0x1, 0x401, {0x0, @in={{0x2, 0x4e23, @remote}}, 0x7b05, 0xfffffff7, 0x0, 0x7, 0x40}}, &(0x7f00000003c0)=0xb0) r2 = open(&(0x7f0000000080)='./file2\x00', 0x114241, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32, @ANYRES32, @ANYBLOB="cbd01f0700000017ec6c76d500000004a315573af985d490a3bbb07487d6f5568ede648cb9d04db88996a0a532727090a3be63e9cd8aa58fe53301b01e967a1203"], 0x4, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, [], [], [], 0x8ed, 0x2, 0x1, 0x1b, "13cc6a7a45751f58c3e11dc3da0213a7"}) socket$isdn_base(0x22, 0x3, 0x0) renameat(r2, &(0x7f0000000180)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_matches\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) 00:47:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) rt_sigqueueinfo(0x0, 0x2d, &(0x7f0000000540)={0x33, 0x40, 0xffffffff}) r1 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) ioctl$NBD_DO_IT(r1, 0xab03) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x8e0f) syz_open_dev$ndb(0x0, 0x0, 0x3) r3 = socket(0x2, 0x1, 0x0) r4 = dup2(r3, r0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, 0x8) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000000100)='X', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvmsg$can_raw(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/104, 0x68}, {&(0x7f00000001c0)=""/93, 0x5d}, {&(0x7f0000000240)=""/253, 0xfd}, {&(0x7f0000000340)=""/77, 0x4d}], 0x4, &(0x7f0000000400)=""/207, 0xcf}, 0x40012120) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) 00:47:21 executing program 5: fchdir(0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000140)={0x10001, 0x0, &(0x7f0000ffb000/0x2000)=nil}) syz_mount_image$ceph(&(0x7f0000000180)='ceph\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="48928f3299208935f125fe03df37239ad857fcd2b97f3946a685e2266894642f21ab5a246a8077355a6d1fabdfdba302f353f754f0921f53268e93f5df76527363536d906b2a9298ebfda03558840d58ef6a5049cdb3a56a4ca310fdf00ab9a47fb0287ace487972403dc70178a4ba", 0x6f, 0x9}], 0x108008, &(0x7f00000002c0)='tls\x00') open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 802.578741] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. [ 802.581464] IPVS: length: 253 != 24 [ 802.607557] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ocfs2_control\x00', 0x60002, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x40806685, &(0x7f00000013c0)={0x1, 0x1, 0x1000, 0x6a, &(0x7f0000000340)="e6c8090e18d3672866509d4ed9a618b38fa9fdc85d97813de6f379cce66b1e4461a03aed2154458c36ad179c0b5f916fc641449e8be093a73134b203bce85ecb1827f09d18539e57859397b2f4f5abc587c1ac61b5f498483f79fa946c50fc622e035bef060f61d006e8", 0x1000, 0x0, &(0x7f00000003c0)="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"}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000280)={0x1, 0x3, 0x1000, 0x4b, &(0x7f0000000140)="264b71e437ad2daaed06bb58c17a198e4ec54adf8a8e7785be12a7f57b96682dd0b7e9d0404db2c811a1efc39d5653225f73cd8133a2b0cf70c37669f41a85c69e519cb1ab8c578626bb40", 0x8a, 0x0, &(0x7f00000001c0)="0e4e62bc125aa05ca1ad32d15274b5ac6cdcacf99e306136705d5552efb0a55dd5e2da9f7de8c5f9f9b273ac0a76edff9778740fbe1b76d562acad220c88dac6cd44ae51777b8361b72817fc57ba16cb3d135f03dde82db44f7aad93a429915628394d1278a11e7894a5572c5bfc3fd72aca3eabb859f8041dc3357fe46de297fe3701046fdd20388f90"}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 802.662196] selinux_nlmsg_perm: 308 callbacks suppressed [ 802.662208] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4963 comm=syz-executor.4 [ 802.685215] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.3'. 00:47:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) socket$inet(0x2, 0x4000000000000001, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x5, 0x0, &(0x7f0000000100)) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000180)=0x10, 0x80000) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = fcntl$dupfd(r2, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r4, 0x29, 0x4b, &(0x7f00000004c0)=ANY=[@ANYBLOB="a90e04000000000055125a25fc3731ecbe45e75c9443ab4495007d000000003c1cf15d3b7294ff010000000000000000000000000001ff020000000000000000000000000001fe8000000000000000000000000000bb00000000000000000000ffffac1414aa000000000000000000000000000000018a41a1bcd5bee9f241308045c9b1920f70c09cdf23aa16a165bb1da7b447a5ec4347bde73632369f2b8c9aaa707ed80266dd70d20632249f701296996f56b85846662b65589fc123208849348ae54d66f493848ea43bd203e24a611afcde5b87452a9f9f9b07a94b1e2925d4c91b123ca0eea1829173713e45acce5204f259088aa89920042861e900"/264], 0x78) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000200)={@local, r6}, 0x14) sendmmsg$inet6(r4, &(0x7f0000001040)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r6}}}], 0x28}}], 0x1, 0x0) [ 802.723404] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 802.742200] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4963 comm=syz-executor.4 00:47:21 executing program 3: msgget$private(0x0, 0x70a) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) getpeername(r0, 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f0000000000), 0x4) [ 802.773224] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 802.789280] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4963 comm=syz-executor.4 00:47:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f0000000140)={0x8, 0x7f, 0xff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x406, r0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0xdb4) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:21 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) ioctl$SIOCAX25NOUID(r3, 0x89e3, &(0x7f00000001c0)) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x5, [0x5, 0x9, 0xb91d, 0x4, 0x2]}, &(0x7f0000000180)=0xe) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r4, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240)='NLBL_UNLBL\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r6, 0x10e, 0x5, 0x0, &(0x7f0000000100)) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r6, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)={0x100, r5, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:lost_found_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:sshd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_to_team\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team_slave_0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:udev_rules_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_SECCTX={0x2e, 0x7, 'system_u:object_r:iptables_unit_file_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'batadv_slave_1\x00'}]}, 0x100}, 0x1, 0x0, 0x0, 0x4001}, 0x4000) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 802.895830] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4963 comm=syz-executor.4 [ 802.919813] Unknown ioctl -1054845647 [ 802.979596] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4963 comm=syz-executor.4 [ 803.054440] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 803.076575] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4963 comm=syz-executor.4 [ 803.132605] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 803.148464] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4963 comm=syz-executor.4 [ 803.169942] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4963 comm=syz-executor.4 [ 803.170666] overlayfs: filesystem on './file0' not supported as upperdir [ 803.183456] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4963 comm=syz-executor.4 [ 803.202259] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4963 comm=syz-executor.4 [ 803.224729] Unknown ioctl -1054845647 [ 803.232876] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 803.239636] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 803.276815] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 803.320294] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 803.329119] device bridge_slave_1 left promiscuous mode [ 803.347226] bridge0: port 2(bridge_slave_1) entered disabled state 00:47:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SIOCX25SCAUSEDIAG(r2, 0x89ec, &(0x7f0000000180)={0x2a, 0x4}) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r2, 0x4112, 0x0) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0x1001, r3) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f00000002c0)) pipe(&(0x7f0000000280)) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='tls\x00', r3) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "00c4980ad60956cbc55251fc953400", '\x00', "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:22 executing program 3: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c000000000100000000ff000000000000000000180002001400010006000326be0da4d8c26d515adce34eaee50a74c773a9615e1f03f0daa052058920a619b597f597954171dd246816ab71e7341a635409d27cf209fa4511be6a8b8a750eda0e2963e969335b1a943134c26b8eb1e332464a2b31c483bb6c77e41c5a41569d734027992fea6179677a2d330fa5278c38fdbfc2a1b0686791ad602eb3ab9f9b16d8f5f953a93dccf4474629e854c616ec91bdc8756bd1aee1b4162de6e5226a"], 0x1}, 0x1, 0x0, 0x0, 0x4800}, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="00000000000200", 0x7, 0x0, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000180)) 00:47:22 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1) sendto$inet6(r0, 0x0, 0xff, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0xfffffff8, @rand_addr="7ca6c45527cdced060a4c4fbca1da157", 0x100}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000140)={'tunl0\x00'}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:22 executing program 0: sched_setattr(0x0, &(0x7f0000000040)={0x30}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000440), 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x20000480}, 0x18040000) write(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}], 0x10) prctl$PR_SET_THP_DISABLE(0x29, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)) syz_open_pts(r1, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000300)=0x0) sched_setattr(r2, &(0x7f0000000340)={0x38, 0x0, 0x0, 0x1bb, 0x6, 0x4, 0x8, 0x7, 0x10000, 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x2, 0x10}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000280)={r5, 0xffb8, 0xfffc}, 0x8) preadv(r3, &(0x7f00000017c0), 0x199, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f0000000000)={0x0, 0x20002}) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e23, @broadcast}, 0x10) sysfs$3(0x3) sendto$inet(r6, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) r9 = getegid() r10 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r10, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000380)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000600)={0x8e, 0x7d, 0x1, {{0x0, 0x6f, 0x3, 0x59, {0x80, 0x3, 0x1}, 0x40000000, 0x8, 0x9, 0xffffffffffffffff, 0x14, 'mime_typesecurity*($', 0x19, 'cpuacct.usage_percpu_sys\x00', 0xe, '\\}systemvmnet1', 0x1, '@'}, 0xa, '/dev/ptmx\x00', r8, r9, r11}}, 0x8e) r12 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r12, 0xc040564b, &(0x7f0000000180)={0x8, 0x0, 0x201a, 0x9, 0x200, {0x3, 0x7}, 0x1}) sendto$inet(r6, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xfffffffffffffe98) 00:47:22 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x1a) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r6, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d90002000032300000000000000073492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62ab1ec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/130], 0x3c}}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r7, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r8 = fcntl$dupfd(r2, 0x0, r7) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getaddr={0x14, 0x16, 0x300, 0x70bd29, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}}, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) ioctl$SIOCX25SCALLUSERDATA(r10, 0x89e5, &(0x7f0000000300)={0x61, "9ea7b3a49bc30c2d1714136d695bf8194e79221845280ec66f7c380bce4d234fe6f356cf87f842e7a7dc79aab68195d7fb42b8b84c545a32e194c5a95c82996d717ea6b1ee409dc451b62422ad63ca0037ad233cc292b0ebded82b6940e996e5389bd9629ccac86c0b9d033fee1839fa4de4833f02ca575b401bb363ef41b4eb"}) [ 803.377212] device bridge_slave_0 left promiscuous mode [ 803.396544] bridge0: port 1(bridge_slave_0) entered disabled state [ 803.421300] device veth1_macvtap left promiscuous mode [ 803.427093] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 803.451469] device veth0_macvtap left promiscuous mode [ 803.472891] device veth1_vlan left promiscuous mode 00:47:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:22 executing program 3: perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) lsetxattr$security_selinux(0x0, &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) sendto$x25(r2, &(0x7f0000000140)="c5045d67bd0da8a4c927fb1db4d349f739c511a92622098c30984c8ef8fa63bffb7f1b3785", 0x25, 0x0, &(0x7f0000000180)={0x9, @remote={[], 0x1}}, 0x12) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r4, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 803.478729] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 803.500965] device veth0_vlan left promiscuous mode [ 803.578494] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 803.585130] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 803.634800] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 803.716922] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:22 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) r3 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) vmsplice(r3, &(0x7f0000002a00), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x3}, 0x0) open(0x0, 0x0, 0x14) fchdir(0xffffffffffffffff) r4 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x800, 0x0) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r4, &(0x7f0000000600)="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", 0x200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r6, r5, 0x0, 0x7fffffa8) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) accept(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x7fbf07de2b3caf70, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$mouse(0x0, 0x7f, 0x801) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) ioctl$KVM_GET_PIT(r7, 0xc048ae65, &(0x7f00000004c0)) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ttyprintk\x00', 0x0, 0x0) [ 803.827907] device hsr_slave_1 left promiscuous mode [ 803.845085] device hsr_slave_0 left promiscuous mode [ 803.869564] team0 (unregistering): Port device team_slave_1 removed [ 803.882565] team0 (unregistering): Port device team_slave_0 removed [ 803.899693] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 803.918725] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 803.936440] audit: type=1800 audit(1579913242.644:478): pid=5024 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=16591 res=0 [ 803.987626] audit: type=1804 audit(1579913242.674:479): pid=5024 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir482722085/syzkaller.M7NdP1/1017/file0" dev="sda1" ino=16591 res=1 [ 804.008331] bond0 (unregistering): Released all slaves [ 804.068510] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 805.515501] IPVS: ftp: loaded support on port[0] = 21 [ 805.598879] chnl_net:caif_netlink_parms(): no params data found [ 805.639770] bridge0: port 1(bridge_slave_0) entered blocking state [ 805.646789] bridge0: port 1(bridge_slave_0) entered disabled state [ 805.654032] device bridge_slave_0 entered promiscuous mode [ 805.661512] bridge0: port 2(bridge_slave_1) entered blocking state [ 805.667891] bridge0: port 2(bridge_slave_1) entered disabled state [ 805.675113] device bridge_slave_1 entered promiscuous mode [ 805.691112] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 805.700273] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 805.720840] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 805.727918] team0: Port device team_slave_0 added [ 805.733611] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 805.740932] team0: Port device team_slave_1 added [ 805.755201] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 805.761570] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 805.787543] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 805.799113] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 805.805445] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 805.830731] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 805.841569] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 805.848994] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 805.869227] device hsr_slave_0 entered promiscuous mode [ 805.875087] device hsr_slave_1 entered promiscuous mode [ 805.881240] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 805.888286] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 805.954204] bridge0: port 2(bridge_slave_1) entered blocking state [ 805.960613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 805.967182] bridge0: port 1(bridge_slave_0) entered blocking state [ 805.973582] bridge0: port 1(bridge_slave_0) entered forwarding state [ 806.008023] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 806.014249] 8021q: adding VLAN 0 to HW filter on device bond0 [ 806.024104] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 806.033610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 806.041741] bridge0: port 1(bridge_slave_0) entered disabled state [ 806.048396] bridge0: port 2(bridge_slave_1) entered disabled state [ 806.058717] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 806.065504] 8021q: adding VLAN 0 to HW filter on device team0 [ 806.074869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 806.082494] bridge0: port 1(bridge_slave_0) entered blocking state [ 806.088818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 806.098539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 806.106373] bridge0: port 2(bridge_slave_1) entered blocking state [ 806.112752] bridge0: port 2(bridge_slave_1) entered forwarding state [ 806.129706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 806.137666] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 806.147543] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 806.159734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 806.173583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 806.183131] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 806.189292] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 806.204271] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 806.211938] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 806.218599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 806.229005] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 806.299590] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 806.312411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 806.351004] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 806.358154] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 806.365063] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 806.376262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 806.383777] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 806.390971] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 806.399561] device veth0_vlan entered promiscuous mode [ 806.411463] device veth1_vlan entered promiscuous mode [ 806.417196] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 806.426983] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 806.439607] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 806.449189] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 806.456485] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 806.464083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 806.473937] device veth0_macvtap entered promiscuous mode [ 806.479920] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 806.489724] device veth1_macvtap entered promiscuous mode [ 806.499456] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 806.508884] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 806.518776] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 806.528993] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 806.538231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 806.547980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 806.557280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 806.567504] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 806.576665] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 806.586948] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 806.596318] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 806.606327] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 806.615551] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 806.625308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 806.636194] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 806.646571] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 806.657230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 806.665524] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 806.678660] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 806.688455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 806.698542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 806.709035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 806.718219] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 806.728008] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 806.737418] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 806.747515] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 806.756735] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 806.766466] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 806.775654] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 806.785597] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 806.796100] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 806.803694] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 806.811645] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 806.819450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 00:47:25 executing program 2: socket$inet(0x2, 0xa, 0xfc) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4, &(0x7f00000003c0)=[{&(0x7f00000000c0)="350000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000140)="70f02d5a09c1cbea1a014f0dddac58ce665da2954bc16331e8488156ad12ca84058a9f33d077993cb9d6e64d4dcf9f411e952a6150cae49e0d8bb1006d5d925a159e8909776d96d3448c50ffb2416dd68397f764fb5bd35f52f85460343efaa12716ac847b6cb6a13386bda051eedfd34ebf14c0a68889b3874d7d74774a58f109bdffaa57aa733ef6bea961332e8755f1cd1ad95d23e45d7b21aa9833507580de", 0xa1, 0x2}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000000280)="1dec829c0ecb284348be4643be495b5cde4e0b989d17a0e5f2dacb1bc829ce19a6b3f17bcc02fa6e6990e227b8f401599b15574320a8a493567ecdab5bc2f5a840780a272e0612f99f08aeb65667908056d4ba569d8f90e3e56e4607346d7994eb81c91c45777d3052c6defca1997732b67e8847dc19dd7c4ea585f555a7", 0x7e, 0x4}], 0x804811, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) sendmsg$rds(r0, &(0x7f0000001840)={&(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10, &(0x7f00000016c0)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/207, 0xcf}, {&(0x7f0000000200)=""/108, 0x6c}, {&(0x7f0000001540)=""/227, 0xe3}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f0000001640)=""/123, 0x7b}], 0x6, &(0x7f00000017c0)=[@cswp={0x58, 0x114, 0x7, {{0x9, 0x8}, &(0x7f0000001740)=0x8e80, &(0x7f0000001780)=0x7f, 0x8, 0x7fff, 0x6, 0x7fffffff, 0x4, 0x1000}}, @zcopy_cookie={0x18}], 0x70, 0x20040080}, 0x4000054) 00:47:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_INTERFACE(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000000)={0x14, r4, 0xb0343aabd1184b87}, 0x14}}, 0x0) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r4, 0x410, 0x70bd27, 0x25dfdbfe, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x9}]}, 0x2c}}, 0x800) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)='\x00\x00\x00', 0x3, 0x40, 0x0, 0x0) 00:47:25 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000140)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000007300)={0x0, 0x0, &(0x7f00000072c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="540000003000377d000000000000000000000000400001003c00010008000100696665002c0002800400060608000400000000001c00010000000000000000000000000000000000000200000000000004000600afd105b968aa5ead97b556ae95abdd8f21e47a9a53e7e8bf11fc3257059e4d0e8aa512253ebcddff9b45ee9fba600fd4047b77ce5d514e5dac824f59539eb21a15efa94fec019defb9cff3032eaf23badbbf7f356dc52a7e28abc35e69e06cf81586d11ebf1cd342ddd27c8208f6291e4f50740212405852453a8b26eeb38a72063a0ced0c40"], 0x54}}, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) signalfd4(r0, &(0x7f0000000180)={[0x8]}, 0x8, 0x80800) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:25 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r4, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000005e000100"/20, @ANYRES32=r4, @ANYBLOB="0d000100"], 0x1c}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r7 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r7, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r8 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r8, 0x10e, 0x5, 0x0, &(0x7f0000000100)) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) 00:47:25 executing program 0: sched_setattr(0x0, &(0x7f0000000040)={0x30}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000440), 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x20000480}, 0x18040000) write(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}], 0x10) prctl$PR_SET_THP_DISABLE(0x29, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)) syz_open_pts(r1, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000300)=0x0) sched_setattr(r2, &(0x7f0000000340)={0x38, 0x0, 0x0, 0x1bb, 0x6, 0x4, 0x8, 0x7, 0x10000, 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x2, 0x10}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000280)={r5, 0xffb8, 0xfffc}, 0x8) preadv(r3, &(0x7f00000017c0), 0x199, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f0000000000)={0x0, 0x20002}) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e23, @broadcast}, 0x10) sysfs$3(0x3) sendto$inet(r6, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) r9 = getegid() r10 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r10, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000380)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000600)={0x8e, 0x7d, 0x1, {{0x0, 0x6f, 0x3, 0x59, {0x80, 0x3, 0x1}, 0x40000000, 0x8, 0x9, 0xffffffffffffffff, 0x14, 'mime_typesecurity*($', 0x19, 'cpuacct.usage_percpu_sys\x00', 0xe, '\\}systemvmnet1', 0x1, '@'}, 0xa, '/dev/ptmx\x00', r8, r9, r11}}, 0x8e) r12 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r12, 0xc040564b, &(0x7f0000000180)={0x8, 0x0, 0x201a, 0x9, 0x200, {0x3, 0x7}, 0x1}) sendto$inet(r6, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xfffffffffffffe98) 00:47:25 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x180}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="e0000000", @ANYRES16=r4, @ANYBLOB="200026bd7000fddbdf250300000028000580400002800c00028020000680080001000400000004000200040002000400020008000100040000000c0007800c0006800400020004000200200007807c98a633024ffabcb7c9cbcd9dcff34ad1dae457dadc9880ccc400"/114], 0xe0}, 0x1, 0x0, 0x0, 0x8801}, 0x8000) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00)=[{{0x0, 0x0, 0x0}}], 0x159, 0x40000022, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, r6, 0x0, 0x4ffe0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) [ 806.901424] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 806.934016] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) [ 806.935433] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 806.956508] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 806.978624] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 806.979796] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:25 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000180), 0x4) sendto$inet6(r1, 0x0, 0x0, 0x2000c004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @remote}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x248001, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 807.018915] EXT4-fs (loop2): inodes count not valid: 53 vs 128 [ 807.021465] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:25 executing program 1: socket(0x2b, 0x2, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) openat$audio1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio1\x00', 0x109000, 0x0) [ 807.159967] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 00:47:26 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f682f10a4f9ca51e230303030303030303030303030302c757365725f69643d0000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socket(0x10, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r1, 0x10e, 0x5, 0x0, &(0x7f0000000100)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000040)=0xc) setuid(r2) listxattr(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 807.258309] EXT4-fs (loop2): inodes count not valid: 53 vs 128 00:47:26 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r5, r6, &(0x7f0000000040)=0x1, 0xe0) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001100)={r8}, &(0x7f0000001140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r6, 0x84, 0x6d, &(0x7f0000000280)={r8, 0x36, "ac6a82d2b5acd821e04d0478a474e9c2be3b387e029887626c7e3cf456672c29c8210efff7d4d24bdf54e0b4d427ae9a6873dd3c164e"}, &(0x7f00000002c0)=0x3e) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000000)={r8}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000140)={r8, 0xe40}, &(0x7f0000000180)=0x8) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) write$selinux_load(0xffffffffffffffff, &(0x7f0000000140)={0xf97cff8c, 0x8, 'SE Linux', "c07fdc006767a5dca9d2ca48886804751f76e5b92955df8e2f00b1ff0b803c412b29681c051350bfde86d041ce3103d48e28bbd4d8854f297c72966d00f1b9a4ad502826a4adc633372d3353ea375d4a990bff206419e24837eb89d439b1bfdb0e9fd31c7c4b026e8a16af4663f6e8d8c549fc73bcbc8a25572fdcd03b1777cc106156e628200d72d2004b00db2fdfa4596cb0b217ed7b26bd1d35df4ba4b3df5cb741f267f51c29fe3803a779940852835c4fd5df80bc05e1b7133ff2c158704f136369cb5ed8be10f3d9b80a75ea55099bf2f286dd67ad9c72db264083b57de4717f2da172"}, 0xf6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 807.305201] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 807.341734] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x7f, 0x0, 0x0, 0x2, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x20b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xa808) [ 807.383983] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 807.407272] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 807.420058] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) sendto$x25(r2, &(0x7f0000000140)="c04fd5f77cac6f", 0x7, 0x800, &(0x7f0000000180)={0x9, @remote={[], 0x3}}, 0x12) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) ioctl$SNDCTL_DSP_SETTRIGGER(r2, 0x40045010, &(0x7f00000001c0)=0x8) 00:47:26 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000140)=0x63, 0x2) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:26 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000068fe8)="ff0204000000000100000000000000000000000000000205", 0x18) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040)="f1", 0x1, 0x20008845, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x2]}, 0x2}, 0x1c) [ 807.507183] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 807.555436] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 807.585358] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 807.609130] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:26 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r6, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c0000005e000100"/20, @ANYRES32=r6, @ANYBLOB="06000000e20300476a1106d24e49e7dd9c77a8e7dda1d73334e2d1e6519a5dfce162ba833daf918d54f7b7c80a5f89ad7364526b7ec1b2dd41c9dbcbd47d1fab0679de9b"], 0x1c}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 00:47:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r4, 0x10e, 0x5, 0x0, &(0x7f0000000100)) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYRES16=r1, @ANYRES32=r1, @ANYBLOB="000000000000000048001200100001006970364f28cfa561700000003400020008000100", @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRESHEX, @ANYRES64, @ANYPTR64=&(0x7f0000000100)=ANY=[], @ANYRES16, @ANYPTR64, @ANYPTR=&(0x7f0000000180)=ANY=[@ANYRES64=r1, @ANYPTR], @ANYRES32, @ANYRESOCT=r1, @ANYRES32=r4], @ANYBLOB="14001000fe8000000000000000000000000000bb140006000e5566d5cd8dd1886967fecb85fa0ba7"], 0x5}}, 0x0) 00:47:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x2, 0x2c, 0x2, 0x400}]}, 0x10) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) lsetxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:audisp_remote_exec_t:s0\x00', 0x2a, 0x1) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) getsockopt$inet6_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000000140)=""/113, &(0x7f00000001c0)=0x71) 00:47:26 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r1, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r4, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r5 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r5, 0x10e, 0x5, 0x0, &(0x7f0000000100)) dup(r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r7, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$alg(0x26, 0x5, 0x0) mlock2(&(0x7f0000a4f000/0x4000)=nil, 0x4000, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) ioctl$TIOCGPTPEER(r0, 0x5441, 0x9) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x7ffff000) 00:47:26 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000000)=0x690) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@gid={'gid', 0x3d, r5}}]}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x2000, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@allow_other='allow_other'}], [{@subj_role={'subj_role', 0x3d, 'self\'vmnet1\x8flovboxnet0Uppp1!.&'}}, {@fowner_eq={'fowner', 0x3d, r7}}, {@smackfshat={'smackfshat', 0x3d, '\t{('}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@smackfshat={'smackfshat'}}]}}) r8 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl(r8, 0xffffffff, &(0x7f0000000440)="81ad3ccfd93b0d102519e7edd9e10a6414f802084f955c217811c690e06bd67ea214b054ac14edbcb9737b2b14f660df60a802e7e687d51a502f1709cf8fd7635aa767e45051ed0c0fa29d4b30e054d373d39ba74cd1d87770d76b09ca805eaf43ae31c756c8ad1b8711b7d81c7df8184119b1a8d050c4a259f98a774d1889a9847971f54cae9692295eec9ceb3ffabf7fa7aa3b8fca78266150f0022297af5ce1390a079bc082089103cd70a0c226dd88ed43de47809e51d68602a2d1296a724c85a88b052410b52b5d2b45145865ba30b1a5b458b5886b46b3f0079ce183cfc21f") getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={0x0, 0x2}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000580)={r9, @in6={{0xa, 0x4e23, 0x7, @remote, 0xffffffff}}, 0xf4, 0xfe00, 0x8000, 0x20, 0x1, 0x7f2e843b, 0x80}, &(0x7f0000000640)=0x9c) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 00:47:26 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x3d3ea1000d7f9af, 0x0, 0x1000, 0x5, 0x0, 0x20, 0x400}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000002c0)={0x3f, 0x5}, 0xc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) bind$unix(r2, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6}, 0xffffffffffffff7c) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f00000001c0)=0xfff, 0x4) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x3, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) [ 807.733111] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 807.802231] selinux_nlmsg_perm: 150 callbacks suppressed [ 807.802242] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5134 comm=syz-executor.4 [ 807.819924] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 807.834008] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 807.861368] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 807.940396] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 807.948635] batman_adv: batadv0: Removing interface: batadv_slave_0 00:47:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x1, {0xffffffe1, 0xfffffc01, "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", 0x81, 0x6, 0x3, 0xe0, 0xfd, 0x0, 0x3}, r4}}, 0x128) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 807.981209] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 807.988213] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 808.047666] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5134 comm=syz-executor.4 00:47:26 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000001c0)={0x9e0000, 0x2, 0x3, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0xa00901, 0xfffffe42, [], @string=&(0x7f0000000140)=0xff}}) sendmsg$IPSET_CMD_ADD(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, 0x9, 0x6, 0x401, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x9}, @IPSET_ATTR_ADT={0x44, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e24}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x3}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x3}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x7}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0xfffffff000000000}}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 808.110538] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:26 executing program 3: syz_mount_image$reiserfs(&(0x7f00000002c0)='reiserfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303000003030303030301130303030305e00ec3f396ad049575bbac752072235f0b82c7884ff19f5391bfb8996ae62b598ef927132ef34b9e6b09d2c2c0c869a434b3a0613d196262420460a01815b016baf3d34c87d65a50b0fbd7a962b5af49172ab12ed9f4e52f3fc0a96fb296d8dc4a7e3b5c4eddd2aab619034d247cae9367703c978fe3fc96d24db8028e9d6fd7cd0cc78188e4b0974a590a0d6fb"]) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x1ff, 0x8, &(0x7f0000002700)=[{&(0x7f0000000340)="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", 0x1000, 0x80}, {&(0x7f0000000180)="d34565b1b2a251503fa7a8b89cdd3766c02c07b9080d3453a8cde46e7cabd46bc2189a1e26a1ddf19f5b680cbdb4d55bd6c642a6a290899b52396965131ebf9d77dc2453cb6f519141e2be19389b8181e4218718ac3410f4154f8207ba12cbfbbef249001aaf158889bf9b73ac64aaa7dae3e446fa16ed3e0b53a6b434409b96aa2afecd3a894f576028739dc2a76aa61ed32c8a5a330edb67e2f49ba43485406528dd453760bc8c65c80d69e6607b25a3b12bdcbb9fafac", 0xb8}, {&(0x7f0000001340)="8d08eadd42d50b82b456bc0c3322053bb323292f088b8d937fce3916b777049c81d34c8b94d86c523639442eba5f5147735a7651b1b8b756bed316a66ac04435a5d9c2475273429f92fb79b0d54f5facdd40c55712021a90e8c3e463d76e129993428d1be7e125b9287727d1c2903d7165b79aeca1ea66bbd648ccab78c719278282379408bb1b18cf919eb321ad2785e16aefad49e66b71368b6e69159db319c2c187bb23cd05e9bf6cdb8f1396c31b01f39fc8ce324d0d8f76be129b850b43306fb02ce62f73d520a0f6bfb458b28e1be5eb890bc8ab74acebca6d871bb5607ceef1e4c98e0377", 0xe8, 0x400}, {&(0x7f0000001440)="7a546235c3ff2d7bc176e880ac2cbe45e7ede9d44189e71912a812680c6fa2995dd7a9606b9fd7be517ba412964d9b2b608d12464bc6f1e75e25f752963ed8c6128d377ab00494c52e57c4b94403f1621f58fa36b3730d7726608c8421b519fc1167999b5cf1300550eeba78d329a2eac097eaf14257bc5df8343bca4fb714ea9836bc577d5d4ae886d9ae0c6c01c61bb7b2e40a052a52d9569646ee466b84b8ae61aacd17dbc27ed534704f0687e05827d0a160ec37bcb0", 0xb8, 0x100000001}, {&(0x7f0000001500)="c840c4310158928d50490bbf6a2edd1a8ebdef6f0f3faceadfcbd0505a6619f6b256ce76b80f275a0a5cd2d3185005f8093e557a1a3cb58fa9e3a6229d37459e760a90fd9ff78cb46489330e6b05f0aac4547de4d987b73b5cea95e556d49929cb34e3ea2fc7f36db95d47a9a7064cc45ba5e3eabaf737e6c51967b901f3bafe8c176c795aa159c952c09b861c7f3deef0d26edb6d91f98e3cc1ab1abf2894134a35b5d5631fbcc17cf523980a4221e7eea96ea6dea686c15c21dd7e0edcc613f0a0767ed6d78b960febb3cfeb39e73623ca94c4d094832db5930e5db375209209649dc15ce825effc0007337c115e", 0xef, 0x5}, {&(0x7f0000001600)="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", 0x1000, 0x6}, {&(0x7f0000000240)="45bafcf8f8a20d810707dda6b4bce8c39996f1be973c0b70f58f67245ff14fe56a1a47a995c4fe26bfb7cd8f6310421e73fe61460e3cfbb421d03010961f8581f500d042e7174394fd307b02778cc397a9a91069", 0x54, 0x3f}, {&(0x7f0000002600)="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", 0xfa, 0x4}], 0x20001, 0x0) [ 808.167155] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5134 comm=syz-executor.4 00:47:26 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000000)=0x690) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@gid={'gid', 0x3d, r5}}]}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x2000, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@allow_other='allow_other'}], [{@subj_role={'subj_role', 0x3d, 'self\'vmnet1\x8flovboxnet0Uppp1!.&'}}, {@fowner_eq={'fowner', 0x3d, r7}}, {@smackfshat={'smackfshat', 0x3d, '\t{('}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@smackfshat={'smackfshat'}}]}}) r8 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl(r8, 0xffffffff, &(0x7f0000000440)="81ad3ccfd93b0d102519e7edd9e10a6414f802084f955c217811c690e06bd67ea214b054ac14edbcb9737b2b14f660df60a802e7e687d51a502f1709cf8fd7635aa767e45051ed0c0fa29d4b30e054d373d39ba74cd1d87770d76b09ca805eaf43ae31c756c8ad1b8711b7d81c7df8184119b1a8d050c4a259f98a774d1889a9847971f54cae9692295eec9ceb3ffabf7fa7aa3b8fca78266150f0022297af5ce1390a079bc082089103cd70a0c226dd88ed43de47809e51d68602a2d1296a724c85a88b052410b52b5d2b45145865ba30b1a5b458b5886b46b3f0079ce183cfc21f") getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={0x0, 0x2}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000580)={r9, @in6={{0xa, 0x4e23, 0x7, @remote, 0xffffffff}}, 0xf4, 0xfe00, 0x8000, 0x20, 0x1, 0x7f2e843b, 0x80}, &(0x7f0000000640)=0x9c) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 00:47:26 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x3d3ea1000d7f9af, 0x0, 0x1000, 0x5, 0x0, 0x20, 0x400}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000002c0)={0x3f, 0x5}, 0xc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) bind$unix(r2, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6}, 0xffffffffffffff7c) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f00000001c0)=0xfff, 0x4) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x3, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) [ 808.217986] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 808.244649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5134 comm=syz-executor.4 [ 808.310586] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 808.328263] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5134 comm=syz-executor.4 [ 808.390450] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5134 comm=syz-executor.4 [ 808.410670] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5134 comm=syz-executor.4 [ 808.463511] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5134 comm=syz-executor.4 [ 808.544931] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5134 comm=syz-executor.4 [ 808.606062] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 808.638118] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5134 comm=syz-executor.4 00:47:27 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000300)={{0xc0, 0x1}, 'port0\x00', 0x8, 0x4, 0x2, 0x321a, 0x5, 0x6, 0x5ba, 0x0, 0x2, 0x9}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r6, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x6}}, 0x1c}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 00:47:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0x7c, 0x2, "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", 0x0, 0x0, 0x3c, 0x6, 0x3, 0x7, 0x3, 0x1}, r2}}, 0x120) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000180)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f0000000140)={0x79f4}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r5 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r5, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r6 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r6, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r7 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r7, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r8 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r8, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r9 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r9, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ppoll(&(0x7f0000000380)=[{r3, 0x9010}, {0xffffffffffffffff, 0x5008}, {r5, 0x4}, {r6, 0x2b}, {r7, 0x228}, {r3, 0x4}, {r8, 0x400}, {r0}, {r9, 0x20a4}], 0x9, &(0x7f0000000400)={0x77359400}, &(0x7f0000000440)={[0x8]}, 0x8) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:27 executing program 5: fchdir(0xffffffffffffffff) socketpair(0x2c, 0x6, 0x40, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={'veth1_to_bridge\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:27 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000200)='nfs4\x00', &(0x7f0000000240)='./file0\x00', 0x401, 0x2, &(0x7f0000000300)=[{&(0x7f0000000280)="096838238cf4eccae9ce7de71716d4db741c00f6468c64e1c721d91af4720661cb92", 0x22, 0x401}, {&(0x7f00000002c0)="4920d514f1d3591a383955fa86eb17137293426120916356ff501bf6040d58003dd40c921068e77dc33afc002992e3f3334033a20eb7a119aedc", 0x3a, 0x6c43c46b}], 0x20020, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r1, 0x10e, 0x5, 0x0, &(0x7f0000000100)) fstat(r0, &(0x7f0000000480)) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f00000003c0)={'ipvlan0\x00', 0x100000}) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = signalfd(0xffffffffffffffff, &(0x7f00000001c0)={[0x5]}, 0x8) ioctl$void(r4, 0xc0045878) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00', 0x4000}) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket(0x10, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000080)) close(0xffffffffffffffff) 00:47:27 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x40600, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000040)=0x200, 0x4) renameat(0xffffffffffffffff, 0x0, r1, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r3, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x1, 0x0, r2, &(0x7f0000000000)="98", 0x3e80000000}]) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 00:47:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) r2 = msgget$private(0x0, 0x0) msgrcv(r2, &(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x1000) msgsnd(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="0200fed04d799706c0c657e781b0d4ca00000000000000"], 0x2000, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000340)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="00000000b08551ceff79e75e7d010000005312079e6c27a654c681ca09f64cc572cbf7448677fe2a66aad5cec3331851bcf189b8c21243378ca98532251148ccd1a97a07cafb66182ca59ce1f908ba5c99d68a605a2b25d691763d1f68aaab5709124a37e50bfb4c9d7c3cb098a75fb6bf5d17a0c73757e92bc5ffed3c50a29f7b8282490f5d33d12fe1c8e273104f1b45eed427de907663ef322b2ce4ce0ef00a391985", @ANYRESHEX=r6, @ANYBLOB="2580"]) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r7, &(0x7f0000000ac0)=[{&(0x7f0000000580)=""/190, 0xbe}, {&(0x7f0000000300)=""/45, 0x2d}, {&(0x7f0000000900)=""/249, 0xf9}, {&(0x7f0000000640)=""/79, 0x4f}, {&(0x7f0000000780)=""/42, 0x2a}, {&(0x7f0000000a00)=""/38, 0x26}, {&(0x7f0000000a40)=""/92, 0x5c}], 0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r8, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000b40)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f0000000540)=0xe8) r10 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r10, 0x10e, 0x5, 0x0, &(0x7f0000000100)) fstat(r10, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getpid() sched_setattr(r12, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)=0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000004c0)={{0x1, r4, r6, r9, r11, 0x6e, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3ff, 0xffff, 0x55f9, 0xfffa, 0x0, r12, r13}) r14 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r14, 0x4090ae82, &(0x7f0000000380)={[0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) socket$pppoe(0x18, 0x1, 0x0) ioctl$KVM_RUN(r14, 0xae80, 0x0) r15 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r15, &(0x7f00000017c0), 0x199, 0x0) r16 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r16, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r16, 0x84, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r15, 0x84, 0x71, &(0x7f00000001c0)={r17, 0x2}, 0x8) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$KVM_RUN(r14, 0xae80, 0x0) [ 808.715681] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 808.717530] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 808.752136] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 00:47:27 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000140)=0x100) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_GET_BYNAME(r3, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, 0xe, 0x6, 0x5, 0x0, 0x0, {0xc, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x10) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 808.788701] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000080)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000000)={0x7a}) ioctl$KDGETLED(r3, 0x4b31, &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@ccm_128={{0x303}, "5168134be4358221", "207b5c9872095508d9a0662997322250", "b50240c9", "1feceab469240353"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:27 executing program 0: ioctl$TIOCL_SETVESABLANK(0xffffffffffffffff, 0x541c, 0x0) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xe47, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0xef, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000180)) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000040)={0x3, 0x3, 0x1}) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r3, 0xc0c85666, &(0x7f0000000240)={{0x2, @name="5c143756cbd2e82cec3e6baaffb348d15e2116982b2c12ff64d10412a80ec877"}, "989ce61028e7936247d0fa7b78364aa02c48f8999f9e3490c863d7ca365ae8e2", 0x3}) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x8}) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x3cc, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160b00170002000000000004140e00110002000000dc2976d153b4", 0x235}], 0x1}, 0x0) [ 808.886275] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 808.958896] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 809.013500] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:27 executing program 2: r0 = gettid() write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0xffffffffffffffda, 0x8, {{0x4, 0x5, 0x1, r0}}}, 0x28) ptrace$cont(0xffffffffffffffff, r0, 0x8000, 0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x200, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000080)={'mangle\x00'}, &(0x7f00000000c0)=0x24) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x40) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000140)={0xd3e, 0x1, 0x4, 0x10, 0x6, {}, {0x2, 0x1, 0xe8, 0xff, 0x0, 0x0, "ca928898"}, 0xf4b, 0x0, @offset=0x80000001, 0x2, 0x0, r1}) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f00000001c0)=0x4) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000200)=""/171) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f00000002c0)={0x1, 0x7}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0xa0c02, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, [0xffffffffffffffff, 0x5, 0x9, 0x8, 0x7, 0x1f, 0x523c, 0x2, 0x8, 0x8001, 0x5, 0x5, 0x20, 0x77]}, &(0x7f0000000440)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000480)={r4, 0x2}, &(0x7f00000004c0)=0x8) restart_syscall() r5 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCCONS(r5, 0x541d) close(r5) ptrace$cont(0x1f, r0, 0x20, 0x5152) r6 = openat$cgroup_ro(r2, &(0x7f0000000540)='pids.events\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_DYING(r6, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x14, 0x6, 0x1, 0x301, 0x0, 0x0, {0xa, 0x0, 0x3}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4020000}, 0x10000000) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r6, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x1c, 0x3, 0x8, 0x5, 0x0, 0x0, {0x7, 0x0, 0x3}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x884c}]}, 0x1c}, 0x1, 0x0, 0x0, 0x81}, 0x20000000) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000780), &(0x7f00000007c0)=0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000800)) accept4$phonet_pipe(0xffffffffffffffff, 0x0, &(0x7f0000000840), 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000880)={[{0x15c3, 0xff, 0x2, 0x1, 0x5, 0x9, 0xe1, 0x1, 0x5, 0x8, 0x1, 0x7, 0xfffffffffffffffc}, {0x9, 0xbe0e, 0x1, 0x2, 0x79, 0x6, 0x3, 0x9, 0x3, 0xeb, 0x1, 0xfb, 0x6}, {0x5, 0x2, 0x4, 0x0, 0x5, 0x4, 0x7, 0x1f, 0x84, 0xbd, 0x5, 0x40, 0xffff}], 0x1000}) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000900)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e21, @local}}, 0x24) r7 = syz_open_dev$vbi(&(0x7f0000000940)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_ENUMAUDIO(r7, 0xc0345641, &(0x7f0000000980)={0xfffffff7, "9652d96bfd52c003fedd59ae605a6af862949f6b62dc35699db2ff70305a96e6"}) pipe(&(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_S_FMT(r8, 0xc0d05605, &(0x7f0000000a00)={0x3, @sdr={0x38323151, 0x1000}}) 00:47:27 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0xffffffff7fffffff, 0x0) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000180)={0xff, 0x1, [0x64, 0xff, 0x9, 0x3, 0xffcb], 0x1000}) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_WRITEI_FRAMES(0xffffffffffffffff, 0x40184150, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x80}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ab64}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f00000000c0)={0x2}, 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@mcast2, 0x0, 0xfffd, 0x0, 0x0, 0xa}, {}, {0x9f2}, 0xbf, 0x0, 0x1}, {{@in=@loopback, 0x4d4, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r6, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) getgid() ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) sendmmsg(r6, &(0x7f0000007e00), 0x400000000000058, 0x0) syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x101, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 00:47:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f00000008c0)=0x7ff) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x1, 0x0, &(0x7f0000000100)) preadv(r3, &(0x7f0000000780), 0x0, 0x4080000000) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000840)=@gcm_256={{0x303}, "a6fd9102074710ba", "b12d0c938c5b9801347d07e197fe870ec289a7cbb0867c7c0b07ea925bb9ba8a", "490053d0", "ae918a6fa9081974"}, 0x38) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000880)) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) ioctl$IMCLEAR_L2(r4, 0x80044946, &(0x7f0000000940)=0xfffffffd) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 809.218763] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 809.266351] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:28 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c005c514bc30104000000000000000000003538395aae00004de228bf5f1267290987961589bb14bcaa0e629b165f8a506451a72ce1154d1b85a1358c0f734e7257599b8d6f89face707588f2f1af8c6e91d27019397745eac95ee809000000000000009468646d3f79b0c0e666ab71ac31d955b7a16509eda03b9295908a90aa377837ae74798cbec5bd25fcf40014c72b3fa21e0d02b0669eaa6f", @ANYRES32=r5, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x6}}, 0x1c}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 00:47:28 executing program 5: fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x81, 0x169080) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsetxattr(r2, &(0x7f00000001c0)=@known='system.sockprotoname\x00', &(0x7f0000000200)='cgroup{-#)vboxnet1usercpuseteth1^vmnet1\x00', 0x28, 0x3) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x10000, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000180)='highspeed\x00', 0xa) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:28 executing program 2: ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x14000, 0x0) signalfd4(r0, &(0x7f00000000c0)={[0x81]}, 0x8, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sendfile(r2, r1, 0x0, 0x209) 00:47:28 executing program 3: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x18) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000180)=0xc, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x8, 0x801, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xefffffff}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x800}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x22eb}]}, 0x4c}}, 0x0) 00:47:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x0, 0x10000, 0x5, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x9a090d, 0x6, [], @value64=0x5}}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f00000000c0)={0x0, 0x0, [0x401, 0x0, 0x200, 0x80]}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x2, 0x3, 0x340, 0xb8, 0x0, 0xb8, 0xb8, 0xb8, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x3, 0x0, {[{{@ip={@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'bond_slave_1\x00', 'veth1\x00'}, 0x0, 0x70, 0xb8, 0x0, {0x6020000}}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x3f, 'syz0\x00'}}}, {{@uncond, 0x0, 0x1c8, 0x1f0, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'bridge_slave_1\x00', {0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x8}}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3a0) 00:47:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @rand_addr, 0xfffffffc}, 0xfffffffffffffc90) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 809.605617] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:28 executing program 3: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6f, 0x0) r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) mmap$binder(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x80000000) getegid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000d40)=@nullb='/dev/nullb0\x00', &(0x7f0000000d80)='./file0\x00', &(0x7f0000000000)='bfs\x00', 0x0, 0x0) 00:47:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:28 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000100)=0x0) r2 = pkey_alloc(0x0, 0x76f47f5ec17fc10c) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000005, r2) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000000)={0x4, 0x960000, 0x0, 0x1, 0x0, r0, &(0x7f0000000040)="100000400300"/16, 0x12feb4b79b2ed303, 0x0, 0x0, 0x2}]) 00:47:28 executing program 3: ioctl$TIOCL_SETVESABLANK(0xffffffffffffffff, 0x541c, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000180)={{0x1, 0x0, 0x1, 0x3}, 0x7fff, 0x78ee, 'id1\x00', 'timer0\x00', 0x0, 0x10000, 0x401, 0x0, 0xff}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) connect$pppoe(r1, &(0x7f0000000240)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}, 0x1e) ioctl$sock_ifreq(r1, 0x8930, &(0x7f00000002c0)={'team_slave_1\x00', @ifru_settings={0xff, 0x9, @fr_pvc_info=0x0}}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3cc, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160b00170002000000000004140e00110002000000dc2976d153b4", 0x235}], 0x1}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) splice(r2, &(0x7f0000000040)=0x111, r3, &(0x7f0000000280)=0xf, 0x1, 0x4) [ 809.687958] audit: type=1400 audit(1579913248.394:480): avc: denied { map } for pid=5237 comm="syz-executor.3" path="/dev/snd/pcmC1D1c" dev="devtmpfs" ino=1720 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 00:47:28 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x4, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e20, 0xe482, @mcast1, 0x100}}}, 0xa0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20, 0x3244}, 0x13414, 0xffffffffffffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20004000, &(0x7f0000000040)={0xa, 0x20004e22, 0x1, @dev={0xfe, 0x80, [], 0x1f}, 0x6}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "69dd4000", "7ee514ec9b8730b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) ioctl$BINDER_THREAD_EXIT(r4, 0x40046208, 0x0) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000000), 0x8) r6 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r6, 0x10e, 0x5, 0x0, &(0x7f0000000100)) listen(r3, 0x0) accept(r5, 0x0, 0x0) r7 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r7, 0x1000000000016) sendto$inet6(r2, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 809.750484] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 809.775870] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:28 executing program 2: inotify_init1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) accept$ax25(r0, &(0x7f0000000100)={{0x3, @netrom}, [@rose, @netrom, @rose, @remote, @remote, @netrom, @default, @netrom]}, &(0x7f0000000080)=0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) io_setup(0x0, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x402c82, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2}, 0x47c) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0xb72}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)}, 0x0) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) dup(r1) getresuid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) lstat(0x0, &(0x7f0000000400)) r2 = getegid() mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x44870, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read'}}, {@default_permissions='default_permissions'}]}}) lstat(0x0, &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 00:47:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) readv(r3, &(0x7f0000000480)=[{&(0x7f0000000300)=""/132, 0x84}, {&(0x7f00000003c0)=""/141, 0x8d}], 0x2) nanosleep(&(0x7f0000000280)={0x77359400}, 0x0) accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000240)) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000000)={0x7a}) ioctl$TIOCL_GETSHIFTSTATE(r2, 0x541c, &(0x7f0000000200)={0x6, 0x5}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x280c2, 0x0) ioctl$SIOCRSGL2CALL(r5, 0x89e5, &(0x7f00000001c0)=@rose) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\a\x00', "442065238929350ade91900b51fc9534", "53c7781e", "2cbe00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r6 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r6, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r7 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r7, 0x8983, &(0x7f0000000140)={0x6, 'geneve1\x00', {0x7f}, 0xffff}) [ 810.465554] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 810.496663] batman_adv: batadv0: Removing interface: batadv_slave_0 00:47:29 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r5, 0x0, 0x60, &(0x7f0000000440)={'filter\x00', 0x7, 0x4, 0x3e8, 0x1f8, 0x110, 0x110, 0x300, 0x300, 0x300, 0x4, &(0x7f0000000400), {[{{@arp={@multicast1, @rand_addr=0x6, 0xff, 0xffffff00, 0x4, 0xf, {@mac=@remote, {[0x0, 0xff, 0x0, 0xff, 0x0, 0xff]}}, {@mac=@random="42d1cac64c00", {[0x0, 0x0, 0xff, 0x0, 0xff]}}, 0x5, 0x51c, 0x7fff, 0x7, 0x2, 0x9, 'xfrm0\x00', 'ipvlan1\x00', {0xff}, {0xff}}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="d96ecf15f817", @local, @remote, 0xf, 0xffffffff}}}, {{@arp={@rand_addr=0x8, @remote, 0xffffff00, 0xffffff00, 0x9, 0x5, {@mac=@local, {[0x0, 0xff, 0xff, 0xff, 0xff]}}, {@mac=@broadcast, {[0xff, 0xff, 0x0, 0xff, 0xff]}}, 0xfeff, 0xff, 0x1f, 0x8001, 0x7ff, 0xff, 'veth0_to_bond\x00', 'bond_slave_0\x00', {}, {0xff}, 0x0, 0x28}, 0xc0, 0xe8}, @unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x2}}}, {{@arp={@initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, 0xff, 0xff000000, 0xc, 0x4, {@mac, {[0xff, 0x0, 0xff, 0x101, 0xff]}}, {@empty, {[0xff, 0xff, 0xff, 0xff, 0x0, 0xff]}}, 0x59f, 0x400, 0x4, 0xf7b0, 0xfffa, 0x9, 'bridge0\x00', 'geneve1\x00', {}, {0xff}}, 0xc0, 0x108}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0x843f, {0x43}}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x438) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r8, r9, &(0x7f0000000040)=0x1, 0xe0) r10 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r10, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001100)={r11}, &(0x7f0000001140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r9, 0x84, 0x6d, &(0x7f0000000280)={r11, 0x36, "ac6a82d2b5acd821e04d0478a474e9c2be3b387e029887626c7e3cf456672c29c8210efff7d4d24bdf54e0b4d427ae9a6873dd3c164e"}, &(0x7f00000002c0)=0x3e) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r7, 0x84, 0x1b, &(0x7f0000000000)={r11}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000900)={r11, @in={{0x2, 0x4e24, @multicast1}}, 0xffffffc0, 0x8, 0xff, 0xa3, 0x0, 0x8, 0x69}, &(0x7f00000009c0)=0x9c) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000a00)=r12, 0x4) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r13, @ANYBLOB="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"], 0x3c}}, 0x0) r14 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r14, &(0x7f00000017c0), 0x199, 0x0) sendmsg$nl_route(r14, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x3, {0x0, 0x0, 0x0, r13, 0x6}}, 0x1c}}, 0x0) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) r16 = dup2(r15, r15) r17 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r17, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r18 = accept(r17, &(0x7f0000000300)=@pppol2tpin6, &(0x7f0000000140)=0x80) r19 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r19, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r19, 0x84, 0x21, &(0x7f0000000880), &(0x7f00000008c0)=0x4) r20 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r20, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$sock_bt_bnep_BNEPCONNADD(r18, 0x400442c8, &(0x7f0000000380)={r20, 0x94dd, 0x0, "030a0db5e875c5ae94b1997258abcec7879765e84bcec91b06ac3905b03a5ea258093a93202ac5462d89fb9ee3130c1ec3589569830a243fa1c640cc32cc81d30b762281ce532615ae2f5bbdcc43e287"}) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r21 = socket$inet6_tcp(0xa, 0x1, 0x0) splice(r0, 0x0, r21, 0x0, 0xfffffffffffffff9, 0x0) [ 810.519330] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 810.540986] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 810.543542] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 810.582506] device bridge_slave_1 left promiscuous mode [ 810.600546] bridge0: port 2(bridge_slave_1) entered disabled state [ 810.616405] device bridge_slave_0 left promiscuous mode [ 810.628876] bridge0: port 1(bridge_slave_0) entered disabled state [ 810.653151] device veth1_macvtap left promiscuous mode [ 810.665452] device veth0_macvtap left promiscuous mode [ 810.666370] syz-executor.5 (5251) used greatest stack depth: 22656 bytes left [ 810.692538] device veth1_vlan left promiscuous mode [ 810.717803] device veth0_vlan left promiscuous mode 00:47:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0xc0002, 0x0) bind$unix(r0, &(0x7f0000000640)=@abs={0x1, 0x0, 0x4e24}, 0x6e) socket$nl_generic(0x10, 0x3, 0x10) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x6000, &(0x7f00000002c0)=ANY=[@ANYBLOB="757050657264694f3d726469723d2e3a6669bcd69cc18216ea4a4969723d2e2f66696c653100"/49]) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/mls\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000cab000)=0x1f8) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, [], [], [], 0x8ed, 0x0, 0x1, 0x1b, "13cc6a7a45751f58c3e11dc3da0213a7"}) socket$isdn_base(0x22, 0x3, 0x0) execve(0x0, &(0x7f0000000b40)=[0x0, &(0x7f0000000a40)='system.posix_acl_access\x00', &(0x7f0000000ac0)='overlay\x00', &(0x7f0000000b00)='overlay\x00'], &(0x7f0000000c80)=[0x0, &(0x7f0000000bc0)='selinux\x00', &(0x7f0000000c00)='system.posix_acl_access\x00', &(0x7f0000000c40)='/dev/vsock\x00']) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x200c0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001100)={r7}, &(0x7f0000001140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYRES32=r7, @ANYBLOB="36000000ac6a82d2b5acd821e04d0478a474e9c2be3b387e029887626c7e3cf456672c295bc6c3d32d7ed6a654c8210efff7d4d24bdf54e0b4d427ae9a6873dd3c164e0f37038c34f3342580339b056634ec4e38157ab395b7d080a5c92990dfb371c4b2f876acf2c8b26a26498eb9cd8670f00ce91e8c16b30a13ce569e793d2657d2c2d984ca508cd647b2305511"], &(0x7f00000002c0)=0x3e) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000000)={r7}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000480)={r7, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, [0x100000000, 0xff, 0x4, 0x6, 0xbb, 0xffd, 0x40000, 0xd8f7, 0x9, 0x20, 0x1, 0x7, 0x6, 0x2, 0x100]}, &(0x7f00000001c0)=0x100) renameat(r1, &(0x7f0000000180)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 00:47:29 executing program 5: fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000140)='./file0\x00', 0x4102, 0x100) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000180)=0xdb) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14, r3}, 0x14}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'vlan0\x00', 0x0}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_tcp_int(r5, 0x6, 0x4000000000014, &(0x7f0000000000)=0x80000000002, 0xe3) recvmmsg(r5, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000002c0)={r6, 0x1, 0x6, @dev={[], 0x1f}}, 0x10) setsockopt$inet_mreqn(r5, 0x0, 0x20, &(0x7f0000000100)={@multicast1, @empty, r6}, 0xc) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r7, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_mreqn(r7, 0x0, 0x23, &(0x7f0000000640)={@initdev, @multicast1, 0x0}, &(0x7f0000000680)=0xc) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r9, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000840)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000940)=0xe8) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r11, &(0x7f00000017c0), 0x199, 0x0) getsockopt$PNPIPE_IFINDEX(r11, 0x113, 0x2, &(0x7f0000000a00)=0x0, &(0x7f0000000a40)=0x4) r13 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r13, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_tcp_int(r13, 0x6, 0x4000000000014, &(0x7f0000000000)=0x80000000002, 0xe3) recvmmsg(r13, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000002c0)={r14, 0x1, 0x6, @dev={[], 0x1f}}, 0x10) setsockopt$inet_mreqn(r13, 0x0, 0x20, &(0x7f0000000100)={@multicast1, @empty, r14}, 0xc) r15 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r15, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r15, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_tcp_int(r15, 0x6, 0x4000000000014, &(0x7f0000000000)=0x80000000002, 0xe3) recvmmsg(r15, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000002c0)={r16, 0x1, 0x6, @dev={[], 0x1f}}, 0x10) setsockopt$inet_mreqn(r15, 0x0, 0x20, &(0x7f0000000100)={@multicast1, @empty, r16}, 0xc) r17 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r17, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_mreqn(r17, 0x0, 0x24, &(0x7f0000000a80)={@initdev, @dev, 0x0}, &(0x7f0000000ac0)=0xc) r19 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r19, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r19, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_tcp_int(r19, 0x6, 0x4000000000014, &(0x7f0000000000)=0x80000000002, 0xe3) recvmmsg(r19, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000002c0)={r20, 0x1, 0x6, @dev={[], 0x1f}}, 0x10) setsockopt$inet_mreqn(r19, 0x0, 0x20, &(0x7f0000000100)={@multicast1, @empty, r20}, 0xc) r21 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r21, &(0x7f00000017c0), 0x199, 0x0) accept4$packet(r21, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b40)=0x14, 0x800) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000001080)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001040)={&(0x7f0000000b80)={0x498, r3, 0x10, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r4}, {0x158, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x2c, 0x4, [{0x3ff, 0x8, 0x9}, {0x3ff, 0x2e, 0x20, 0x9}, {0x3, 0x81, 0x2, 0x1}, {0x7, 0x20, 0x8, 0x6}, {0xd, 0xe4, 0x81, 0xfff}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r12}}}]}}, {{0x8, 0x1, r14}, {0x98, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8, 0x6, r16}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{0x2d, 0x0, 0x5, 0x913}, {0x400, 0x3, 0x5, 0x4}, {0x100, 0x7, 0x1, 0x6}, {0x0, 0x43, 0x8, 0xfffffff8}]}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x8001}}}]}}, {{0x8, 0x1, r20}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x100}}}]}}, {{0x8, 0x1, r22}, {0x1f4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x8, 0x4, 0x0, 0x80}, {0x7fff, 0x0, 0x1, 0x7}, {0x0, 0x7, 0x7, 0x8001}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x2c678215}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x1, 0xff, 0x3f, 0x1}, {0x81, 0x4, 0x0, 0x9}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x80}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xac3c}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x8}}}]}}]}, 0x498}, 0x1, 0x0, 0x0, 0x20001810}, 0x4000001) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r23 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bind(r23, &(0x7f0000000200)=@in6={0xa, 0x4e20, 0x6, @mcast1, 0x3}, 0x80) r24 = socket$inet6_tcp(0xa, 0x1, 0x0) r25 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r25, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @rand_addr='7\x00'}, 0x1c) listen(r25, 0x0) sendto$inet6(r24, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r24, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r24, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdd6d4c", "7ecfc730da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r24, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 810.983413] Unknown ioctl -1054845647 [ 811.078167] bond2 (unregistering): Released all slaves [ 811.117852] bond1 (unregistering): Released all slaves [ 811.185507] device hsr_slave_1 left promiscuous mode [ 811.195962] device hsr_slave_0 left promiscuous mode [ 811.209917] team0 (unregistering): Port device team_slave_1 removed [ 811.224652] team0 (unregistering): Port device team_slave_0 removed [ 811.237835] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 811.248890] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 811.286169] bond0 (unregistering): Released all slaves [ 811.309849] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 811.383700] Unknown ioctl -1054845647 [ 812.204914] IPVS: ftp: loaded support on port[0] = 21 [ 812.288885] chnl_net:caif_netlink_parms(): no params data found [ 812.332106] bridge0: port 1(bridge_slave_0) entered blocking state [ 812.338523] bridge0: port 1(bridge_slave_0) entered disabled state [ 812.345680] device bridge_slave_0 entered promiscuous mode [ 812.353254] bridge0: port 2(bridge_slave_1) entered blocking state [ 812.359656] bridge0: port 2(bridge_slave_1) entered disabled state [ 812.367244] device bridge_slave_1 entered promiscuous mode [ 812.385620] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 812.394656] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 812.412214] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 812.419363] team0: Port device team_slave_0 added [ 812.425051] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 812.432362] team0: Port device team_slave_1 added [ 812.449684] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 812.456026] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 812.481313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 812.493256] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 812.499511] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 812.524830] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 812.535553] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 812.543310] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 812.564786] device hsr_slave_0 entered promiscuous mode [ 812.570540] device hsr_slave_1 entered promiscuous mode [ 812.576489] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 812.583830] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 812.645660] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 812.677490] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 812.684078] 8021q: adding VLAN 0 to HW filter on device bond0 [ 812.693714] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 812.702573] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 812.709485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 812.717443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 812.726905] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 812.733338] 8021q: adding VLAN 0 to HW filter on device team0 [ 812.744323] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 812.751383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 812.759170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 812.767210] bridge0: port 1(bridge_slave_0) entered blocking state [ 812.773578] bridge0: port 1(bridge_slave_0) entered forwarding state [ 812.781247] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 812.790901] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 812.798353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 812.806991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 812.814724] bridge0: port 2(bridge_slave_1) entered blocking state [ 812.821085] bridge0: port 2(bridge_slave_1) entered forwarding state [ 812.841936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 812.849624] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 812.857429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 812.865266] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 812.874923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 812.885350] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 812.891528] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 812.907959] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 812.915728] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 812.922531] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 812.929248] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 812.940727] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 813.008351] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 813.018916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 813.056563] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 813.064147] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 813.071987] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 813.082110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 813.089557] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 813.096664] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 813.105989] device veth0_vlan entered promiscuous mode [ 813.116255] device veth1_vlan entered promiscuous mode [ 813.122467] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 813.131895] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 813.146261] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 813.156061] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 813.163718] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 813.171257] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 813.181843] device veth0_macvtap entered promiscuous mode [ 813.188042] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 813.196876] device veth1_macvtap entered promiscuous mode [ 813.205605] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 813.216927] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 813.226078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 813.236144] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 813.245390] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 813.255147] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 813.264363] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 813.274161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 813.283484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 813.293233] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 813.302449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 813.312224] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 813.322763] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 813.333558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 813.342752] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 813.353118] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 813.362990] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 813.372182] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 813.382076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 813.391264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 813.400991] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 813.410159] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 813.419967] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 813.429153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 813.438914] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 813.449370] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 813.456901] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 813.464491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 00:47:32 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000080)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r3, 0x8200) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/201) 00:47:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x3) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:32 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:32 executing program 3: ioctl$TIOCL_SETVESABLANK(0xffffffffffffffff, 0x541c, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000180)={{0x1, 0x0, 0x1, 0x3}, 0x7fff, 0x78ee, 'id1\x00', 'timer0\x00', 0x0, 0x10000, 0x401, 0x0, 0xff}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) connect$pppoe(r1, &(0x7f0000000240)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}, 0x1e) ioctl$sock_ifreq(r1, 0x8930, &(0x7f00000002c0)={'team_slave_1\x00', @ifru_settings={0xff, 0x9, @fr_pvc_info=0x0}}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3cc, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160b00170002000000000004140e00110002000000dc2976d153b4", 0x235}], 0x1}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) splice(r2, &(0x7f0000000040)=0x111, r3, &(0x7f0000000280)=0xf, 0x1, 0x4) 00:47:32 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r6, 0x84, 0x16, &(0x7f0000000440)={0x2, [0x3, 0x1]}, &(0x7f0000000480)=0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x6}}, 0x1c}}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r9, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r9, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e21, 0x0, @empty, 0x5}}, 0x3, 0x8, 0x7fffffff, 0x0, 0x30, 0x8, 0x9}, &(0x7f00000003c0)=0x9c) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f0000000400)={0x8, 0x2, 0x54, 0x8000, r10}, 0x10) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = dup2(r11, r11) setsockopt$sock_timeval(r7, 0x1, 0x43, &(0x7f00000004c0)={0x77359400}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 00:47:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r1, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r2 = dup2(0xffffffffffffffff, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000700)=@filter={'filter\x00', 0xe, 0x4, 0x300, 0x1d0, 0xf8, 0xf8, 0x1d0, 0xf8, 0x268, 0x268, 0x268, 0x268, 0x268, 0x4, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_bridge\x00', {}, {}, 0x6}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28, 'cgroup\x00'}}, @common=@unspec=@statistic={{0x38, 'statistic\x00'}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xb0, 0xd8, 0x0, {}, [@common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, '\x00', 'team0\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x360) [ 813.514861] NFQUEUE: number of total queues is 0 00:47:32 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x400) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r3, 0x908, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7ff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x8040}, 0x20000480) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 813.586196] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 813.599738] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:32 executing program 2: getpid() socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) write$ppp(0xffffffffffffffff, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000800)) getpgrp(0x0) setpriority(0x0, 0x0, 0x0) statx(0xffffffffffffff9c, 0x0, 0x0, 0xfff, 0x0) lstat(0x0, 0x0) accept4$ax25(0xffffffffffffffff, &(0x7f0000000a80)={{0x3, @rose}, [@bcast, @bcast, @default, @default, @default, @default, @remote, @default]}, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000b40)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000c40)=0xe8) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) getresuid(0x0, 0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r3, 0xc0045002, &(0x7f00000000c0)) ioctl$int_in(r3, 0x800000c004500a, &(0x7f0000000240)) read$FUSE(r3, &(0x7f0000000380), 0x1000) socket$inet_sctp(0x2, 0x0, 0x84) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) accept$alg(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 813.652023] audit: type=1804 audit(1579913252.364:481): pid=5330 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir660752796/syzkaller.UXC9rf/1/file0" dev="sda1" ino=17601 res=1 [ 813.686448] selinux_nlmsg_perm: 165 callbacks suppressed [ 813.686459] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5331 comm=syz-executor.4 00:47:32 executing program 0: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x8, 0x9, 0x4, 0x100, 0x5, {0x0, 0x2710}, {0x4, 0x1, 0x3f, 0x8, 0x3, 0x1f, "2346a395"}, 0x3, 0x2, @fd, 0x40, 0x0, 0xffffffffffffffff}) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x23) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00f\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000d372b63c000000000000000000000000000000000000da48fb7246236f6ba0e0f760597e0a918e23d34f9ba86c65db481932df20b3d42e858c16da0fa4f8efb0c34063e923219b899f3d5d360e799751e9c8bd21bb59de6b881a92cc7755ca7811c183c26f107713f4ea89ff862d3d704f1078274d17fd38962664840b64ed7c9c7463f855584e3bd46880a7dd11f38a0831ec461eb1dd9efa72817f6b7216", @ANYRES32, @ANYBLOB="040000004c1631df0255499ac308e80b529bd64e2a2a213c05000000", @ANYRES32, @ANYBLOB='\x00'/28, @ANYRES32, @ANYBLOB='\x00'/28, @ANYRES32, @ANYBLOB="000000800000eeffffffffffe5ef008857262c375b3ea5d200"/37]) r3 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0x1806, 0x4) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000000)) 00:47:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x6, 0x3ff, "973dd2029ccabb7f795062fa0f548f4171b0695b78b8bbcdc985c26291f3be900a26eadf1ec790fd62b33013beea673083b2687380489200c0d2956b7956b0bd1a67d4c774f585d817698cab463b26606106feb68647b8a7350a3b457a3feb44c7cd6af09cdaa2826966a844568ac097f11b0ce9a09dcc66b5f86d730ea2c230d6e4e2842b03794b6d2d68de10503b12648698409487fc609957e33de79edeb2edfab4bdfb68ea2fb934b3bda071673aad908decca2ff4568d41ab0f065089e9a0bb78feee4d0340f8fbb8bc69d06bc334778c6960499a234ba964947fb4d3b529f05b92a81588d475e16af37a271bd9cf4104173caff45fd2e126bcb6bca09a", 0x2, 0x2, 0x4, 0x1, 0x1, 0x9, 0xff}, r2}}, 0x120) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 813.725088] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 813.761078] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 813.810863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5331 comm=syz-executor.4 [ 813.835625] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5331 comm=syz-executor.4 [ 813.858229] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5331 comm=syz-executor.4 [ 813.883632] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:32 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x1, 0x0) ioctl$TIOCSRS485(r0, 0x542f, &(0x7f00000000c0)={0x80, 0x100, 0x6}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000100)='./file0/bus\x00', 0x0) mq_notify(r1, &(0x7f0000000080)) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) dup2(r3, r2) 00:47:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='ip6erspan0\x00', 0x10) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@gcm_256={{0x304}, "c562c415fdb481d8", "0b1223af0a4aeed45fb947d6b7874ffea0d48a5c16097e2ef0bd5ad1f041319b", "4859238e", "471f000016857846"}, 0x38) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 813.912567] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5331 comm=syz-executor.4 [ 813.931101] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 813.932427] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5331 comm=syz-executor.4 [ 813.985789] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5331 comm=syz-executor.4 00:47:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000000)=0x1f) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000540)=0x2000000000000074, 0x56c) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000700)='veno\x00', 0x5) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write(r0, &(0x7f00000001c0)="ee0107200c9f8fbf5ca312794d57d7c84858f6d02ac7044478a1ceaba80c756a581354e1c3bc0f39ab71266531e5c6b4d607559441a2a1492bc86146e4a205b0b8db310441cf08c043a775bb5e3a82dbc589f50c52e15266c634790cab6745980751ca698dbd91bc", 0x7f37) [ 814.026965] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5331 comm=syz-executor.4 [ 814.051950] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5331 comm=syz-executor.4 [ 814.069274] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 814.077362] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5331 comm=syz-executor.4 [ 814.120610] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) sendmmsg$inet6(r2, &(0x7f0000000c00)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x4, @ipv4={[], [], @multicast1}, 0x80}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000180)="4887047120811c5e12dd1ad5e28cc96071df134b6164ac1c6b24587c0ccf1e61030a220880539ab0980e0429df2c85a5a4e35681b05d4374207fef32ec0fe8782eae83228fdefa42ff063a9acf384b4b6363305d3cab3d6da10d35efa3f65f2cb5e06b2b29244f532fafac7c37e4f560780d845065", 0x75}, {&(0x7f0000000200)="1bd0f34e8a8ee5d770a72d76d328de31e2df0cc928385bcb5d3fed357b1bee3da911fdebc315db40cfa4f2a0991066cdb2e97db04c", 0x35}, {&(0x7f0000000240)="c257f0da150ef46eed7d2364357f0dedfba43a5c38783eca066144a5fbd0c112936b8d1f6ebed8e5bb81f7e9d4f61b30a7f3c12988482beae5c39b782c975609322c2b4dc7da257e535b2781ed04ec1f4ef30c553cc7cbf9a691dec41b4d", 0x5e}, {&(0x7f00000002c0)="ecbb75474f34b1767b04fbe46d35e6ee7c0e7b0fb3c813006c7919332cbc46edb4c4aff0474df2f0cd7faf430d603e8c84204bdbc812a96a16f88091ead8edea8ff2bec7aff776380712a72af45da797936d44fad002842b02a30162f7537b5ef8748212db9a8244e6", 0x69}, {&(0x7f0000000340)="6f1e3e5ba31fece02455e1804d0e6c530d945f0fe01304beda4ea9096220f77e6fbc35191a351aac", 0x28}, {&(0x7f0000000380)="2387babed5c9a22c80c5fbf5e3b23862bb25156d35625091dfad3a3bfdb026bf79b119bef04a56cf500f89a66daffdb967494dbbe19a35753a05cb261b0e44a49f18c8602694ce81b76ca362b3436dbc46252ec68db0dec50cbbba25b9e0fd9ccbb7a6b5749488d78c5bda4341301ffdf20747a1522959f4d2e51814e856bc34a1252c5b9793401d7f0ec6f561f453d95f2224c0bd68a08d02e1f7316db5f2adbff3b154510ebda1552537ff29700aaf498ea59fc9935f2174ef00123fe40e095353ddf433f355ce86aadecfa8", 0xcd}, {&(0x7f0000000480)="a8837eafd0805857868100f4d6ad8b339149109c16ae15c322b125cf49239976606f80fa7c3b85c30e9303a2e2b91c4db044fcf02fcabb20994a7771c5ea2e76da58765db434f6570debf0251a3206681268a14d512bc3c99e63fe9ffc09e642906dffa44dd522c6767d865cce", 0x6d}], 0x7, &(0x7f0000000580)=[@rthdr={{0x68, 0x29, 0x39, {0x88, 0xa, 0x2, 0x4, 0x0, [@loopback, @ipv4={[], [], @broadcast}, @empty, @rand_addr="aa0d3c731a101fa6c4d67b870c0fa11c", @rand_addr="ad4feb1aef1cdb348181847bc7b813bc"]}}}, @dstopts_2292={{0x50, 0x29, 0x4, {0x0, 0x6, [], [@calipso={0x7, 0x20, {0x3, 0x6, 0x3, 0x1, [0x400, 0x6, 0x7]}}, @hao={0xc9, 0x10, @mcast2}]}}}, @tclass={{0x14, 0x29, 0x43, 0x9}}, @rthdr_2292={{0x68, 0x29, 0x39, {0x3c, 0xa, 0x0, 0x9, 0x0, [@mcast1, @dev={0xfe, 0x80, [], 0x29}, @mcast2, @mcast1, @loopback]}}}], 0x138}}, {{&(0x7f00000006c0)={0xa, 0x4e20, 0x7, @local, 0xfff}, 0x1c, &(0x7f0000000a80)=[{&(0x7f0000000700)="bbeeda219cb1dc8dc7460c4b30f13c239f7c0010f853aa76eca24843fd00985ccc038c58f011e5542870520051ca52d92f5555c2eb27e58c7152b3068e7242c86e59787e5ad95508b05450816e0200b4b54b4fcf52cabd70691e6dbd50dec452eb668f9ed953b2e23531a68a8145361df5", 0x71}, {&(0x7f0000000780)="6b91e6b1727fadea42e60716d77074705ad955172e566321a0f0eeac7dcc44bb310cddd89dee4e563893805a6dc89c34ad0d268a50d193046e25c2ba39636facf38edca78976f12b8721951764da8f7df8359520347c54b4a4ec92ab49255fcbc0280036d97f8f7453e89e092f00feaf9ce933e114bb686ea5bca4e7f15cb888c9a5ea456162ae25444d9e1fa837aab0b3e555a1865952118a87e2d64b1a10fee15a1a7c1bca27037c9da62fd05e6fb1644a62681741c77f43", 0xb9}, {&(0x7f0000000840)="0c169232f7b9a545759d60521391af61e382a832b71f1b3b5bf8fd92d53719303617dcf72d2b5aae5f36d6507645b08ce846945f6b6879d2338ccf928d9a025ec84bd61098558e38a543c5a92d64fe536ba62f3faa9b5ba1d10bca245c08d1358db2c9ebce0f0e4c6f3b425347ba23f5148f34e6098337a0a23b524cf6359d669cfd369bd8fbe34851c74f1a603c72a39ad2d78223e8cb423a3e9f2b72c82ae2051a77", 0xa3}, {&(0x7f0000000900)="386bbe5b2661f01707a2cbefe93546483510d8f67c25438796edf449ef1b8ad16ab46690822081623ca00e509365cb3bb92632c1c3b3ac170dd9975dcfb9b105981989979b8b60c814c110e814ab4e396e8d50d5f857c1882fdb76d946e450bd889074aca343f30a1ada544d3ee5", 0x6e}, {&(0x7f0000000980)="340e82cdc59a750545e568daf6f41888f57ea78d238058a9d41e103879a909b821f46b820642", 0x26}, {&(0x7f00000009c0)="08e8568db316df65747bcfcc9325f7cf6155a4c6217eaab7a8f74416747f3e2da9c0681b668f27cdf4851258979fd13f8f063023c52317bfa1bfbdb156476fd840635e87b1c6f3a1be0ff9a22abb87", 0x4f}, {&(0x7f0000000a40)="9b0fee8add187af752d15f975a688edd8c421309993ec2e728e11279df02537a8ad26d5e8666c2217cc652df", 0x2c}], 0x7, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0xd0}}], 0x2, 0x51) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/full\x00', 0x121000, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$inet_tcp_int(r4, 0x6, 0x4000000000014, &(0x7f0000000000)=0x80000000002, 0xe3) recvmmsg(r4, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000002c0)={r5, 0x1, 0x6, @dev={[], 0x1f}}, 0x10) setsockopt$inet_mreqn(r4, 0x0, 0x20, &(0x7f0000000100)={@multicast1, @empty, r5}, 0xc) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000b40)={@remote, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x20}}, @loopback, 0xfffffffd, 0x4, 0x8000, 0x600, 0xf5f3, 0x20, r5}) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 814.294518] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 814.313548] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:33 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000140)=""/1, 0x1) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) write$P9_RMKDIR(r1, &(0x7f0000000300)={0x14, 0x49, 0x1, {0x0, 0x1, 0x535d}}, 0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x6}}, 0x1c}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 814.345435] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0xfff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x6, 0x18}, 0xc) setsockopt$inet_buf(r1, 0x0, 0x26, &(0x7f00000000c0)="17000000020001000003be8c5ea8d48559002b080303000400000000000000000a0000000098fc5ad9485bbb6a880000d6c8db0012dba67e06008000e289000000f5009cee4a5acb3da400001fb700674f00c88ebbf9315033bf79ac2dff0601150039527429f80000000000006a22e6f40fa801000000000000ea000000000000010002ffff02dfccebf6ba000840024f0298e9e90554062a80e605007f174aa951f3b700000000000000ce68bf17a6e019b74870ffffff", 0xb8) 00:47:33 executing program 0: syz_emit_ethernet(0x114e, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/btrfs-control\x00', 0x40080, 0x0) ioctl$RNDADDENTROPY(r3, 0x40085203, &(0x7f00000015c0)={0x7f, 0x2c, "5c55e06ab3fd33602e7be6ed1f97dd17c4059d54202e0c1b9c5be2957a53a90fe39ce12d96f1ebd10564c3e2"}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, &(0x7f0000000040)=0x1, 0xe0) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001100)={r7}, &(0x7f0000001140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000280)={r7, 0x36, "ac6a82d2b5acd821e04d0478a474e9c2be3b387e029887626c7e3cf456672c29c8210efff7d4d24bdf54e0b4d427ae9a6873dd3c164e"}, &(0x7f00000002c0)=0x3e) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r8, &(0x7f00000017c0), 0x199, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r8, 0x6, 0x16, &(0x7f0000001980)=[@window={0x3, 0x4, 0x9}, @window={0x3, 0x7, 0x800}, @window={0x3, 0xaa, 0x8}, @window={0x3, 0x401, 0x7}, @mss={0x2, 0x1ff}], 0x5) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000000)={r7}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000001480)={r7, 0x5}, 0x8) setsockopt$inet_dccp_buf(r0, 0x21, 0xc, &(0x7f0000000000)="42642ea21a23691fc5adb10634c0637feac1edcf9a86be33eb508d4e7916f86b088c7246cf77c6a2905c77e598e58a14d636d212eb7f38c1699b7400aaec86e871aeb3153203ca18c4f37a5ab9ba13f051425afc5e64b1ab7c4f6c394ff24b1c43f310abf93f02d485373cb77e123290c6d333b7b45a2d08d0b75a91422b8d445e0a1d7df8fb8cc12046870774a03456fa1cca039db81ce9cce97bd0ee019db6c9e9c5c0e1bd9f3aef12e93ac69b61f708e270929cd4cf347b888f06e5aded61067e6c3205582ac39bad967caa7bf23367bd3797f2f81e19", 0xd8) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f0000001600)=ANY=[@ANYBLOB="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"]) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000018c0)={0x84, r9, 0x2, 0x70bd29, 0x25dfdbff, {}, [@NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'a\x00'}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_REG_RULES={0x14, 0x22, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x3}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x37daf06a}]}, @NL80211_ATTR_REG_RULES={0x24, 0x22, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x2}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x3}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x8}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x5}]}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}]}, 0x84}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockname$unix(0xffffffffffffffff, &(0x7f0000001540), &(0x7f0000001500)=0xc5) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x4886c2, 0x0) 00:47:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r3, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY_FRAG_THRESHOLD={0x8, 0x3f, 0x1f}, @NL80211_ATTR_WIPHY_RTS_THRESHOLD={0x8, 0x40, 0xfffffffd}, @NL80211_ATTR_WIPHY_ANTENNA_RX={0x8, 0x6a, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8809}, 0x4008005) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:33 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x5, 0x0, &(0x7f0000000100)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/load\x00', 0x2, 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000340)='/proc/thread-self\x00', 0x705000, 0x0) dup(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) getsockname(r2, &(0x7f0000000140)=@xdp, &(0x7f00000001c0)=0x80) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xc5, 0x2, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r8, r9, &(0x7f0000000040)=0x1, 0xe0) r10 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r10, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001100)={r11}, &(0x7f0000001140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r9, 0x84, 0x6d, &(0x7f0000000280)={r11, 0x36, "ac6a82d2b5acd821e04d0478a474e9c2be3b387e029887626c7e3cf456672c29c8210efff7d4d24bdf54e0b4d427ae9a6873dd3c164e"}, &(0x7f00000002c0)=0x3e) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r7, 0x84, 0x1b, &(0x7f0000000000)={r11}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000000200)={r11, @in6={{0xa, 0x4e23, 0x8, @rand_addr="9d14a79a4653b33ae34141a3f6444da7", 0x6}}, 0x840b, 0x40000000, 0x8, 0x6, 0x6}, &(0x7f00000002c0)=0x98) sendto$inet6(r3, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0x5) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 814.470765] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 814.511869] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 814.555669] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 814.555940] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:33 executing program 2: setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000140)='./file0\x00', 0x8, 0x1) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6ea19438376765696f3d7375626a5f726f6c653d726569726673002c000000"]) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000080)=0x0) ioctl$SIOCAX25DELUID(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r0}) 00:47:33 executing program 0: socket(0x1, 0x5, 0x7e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x4, 0x8, 0x0, 0x800000000000}, 0x0) socket$inet6(0xa, 0x2, 0x0) shmget(0x2, 0x1000, 0x4, &(0x7f0000ffe000/0x1000)=nil) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r1, &(0x7f0000008880), 0x38, 0x20, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x2000, 0x3, 0xfffffffffffffffd}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000023980)=[{{&(0x7f000001e580)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f000001f900)=[{&(0x7f000001e600)=""/39, 0x27}, {&(0x7f000001e640)=""/148, 0x94}, {&(0x7f000001e700)=""/35, 0x23}, {&(0x7f000001e740)=""/4096, 0x1000}, {&(0x7f000001f740)=""/205, 0xcd}, {&(0x7f0000000740)=""/154, 0x93}], 0x6, &(0x7f000001f980)=""/33, 0x21}, 0x6}, {{&(0x7f000001f9c0)=@tipc=@id, 0x80, &(0x7f0000021d40)=[{&(0x7f000001fa40)=""/120, 0x78}, {&(0x7f0000001780)=""/4098, 0x1002}, {&(0x7f0000020ac0)=""/239, 0xef}, {&(0x7f0000020bc0)=""/4096, 0x1000}, {&(0x7f0000021bc0)=""/115, 0x73}], 0x5}}, {{0x0, 0x0, &(0x7f00000230c0), 0x0, &(0x7f0000023140)}, 0x7}, {{&(0x7f00000003c0)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000023200), 0x0, &(0x7f0000023240)=""/241, 0xf1}, 0x80000000}, {{&(0x7f0000023340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000023400), 0x0, &(0x7f0000000800)=""/107, 0x5c}, 0x4}, {{&(0x7f0000000540)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000023880)=[{&(0x7f0000023540)=""/43, 0x2b}, {&(0x7f0000023580)=""/218, 0xda}, {&(0x7f0000023680)=""/235, 0xeb}, {&(0x7f0000023780)=""/240, 0x23}], 0x4, &(0x7f00000238c0)=""/134, 0x86}, 0x1}], 0x6, 0x20, &(0x7f0000005380)={0x77359400}) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000053c0)=""/185, &(0x7f0000005480)=0xb9) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x200}) openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001200000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000008f3f000000000000000000000000000000000001000000000000000000000000000000000000003f"], 0x119) writev(r5, &(0x7f0000000000)=[{&(0x7f0000000980)="4acc582d79a664b845dfb8ee626a97eafc2a28e15d983cb110e823411f632d7041ff470738a9b7a5ea70f60278245a3464dd847146c05aad7d4ec68f4956390fe89703784898e641efc2a86854554b757ca0efe403f110e46481994ab09dbfadaa4cbe0079bc83eef7e47f40fd0f4f5af7d304968c963a19e20803b92b9cff7ded7f9cbc463e43c9a26b3d59e40ca26693f3310de13ac814276b90b9c7a4cb7613bdfafedcabc1a9595d4fe0928fdee85621275bc35fd9d2c2a4e6e63e63d4ead6ec198c7a68a59d76e528f8371024090186e540956371c7a429797c324068134d2230c98d93173ae680ab3b6416e2dc511c58c850d42cf2e115b44c9ba4b131067fe28e5ea9957ce4e58be93dc5038f264cbe37a739c6db8b5dd5812e31e95f95f210d10a56741fc91c6e6552d02e070d09e220cd89e67253a3a76470d0f6e0d43217b824f386b8a6d13198f55afcc51c8b23e4ac891f99ae7fdb341c08938f87346f86cd6b66ef82638b1e1ff361562b430d744359dd5dd6d5ee30c8b2d1357cd67f126b9eaf369877c0006c4c5e81a5c914f0cf028b1343d4b325b49c35e6c87f8ea7c9b8a1aad96ef2a7da871410824c8210637d75eca7156d4e955d19d3e45631414afcd62668b940e433ffa02b0269d42ebc3ddb803545a797be5471e0192b43c0b99899fa5d070f1c995721a00ecfc4507e0b8d518db888337eec3438a68dc4c44426f08d79115d5c63176bd8949569653913450f9e4d3b00ce4cf4a9d5bf8bfb94487225ae8369ef84001bcc38b7c455753f5790ec6aa5f8d3837a11b2c98e57e1b2cfd6cdeeb17de093bc41d8671c1af67525f1445effb54ef997469174b99c8b10416579666d3e9eb4f390baaf15cc1f0a1c77d7a5a5aa824c63a256724b451dfbffc7ceccd8665423e635130147c5d3c64b2c855f060a56a55b4619a8415d88b5447ad6ec3d077bff12b186b8639198d99d052b73b8a2449934be5c404cfbcce76b6cd127556a5de5b810a6e9edbdd78415b92f6c726b81337c8eab9e261a6cff077eec729f8ba460bb05d44b3825fa81adc066eec0d7c165ce345e09cea1fc40b5e7aedd991ac25dd58a59cee888231ef9b3325ff89bc0370142c4ae22e3cddeb0bcf5c7457311f255f62fbbff205e0510164f27ff9c30ec1369ef698152e88d7a3d1098a6090fb560cb2e0b92df2b0ea5b0ec813b4d2291c4c3c1baf57bc38cf20ad7cf473d7b5188be9350ac61d651eccdc34fe89b7088138982ca802022932ae594460af77bb05471ac389318cf046d536a753048364b03bb682aba6cb9597ff2fdb7f7fc64526a77d23c8deee6a84ff2f9b2215a100f8f99e5f53e31fcffc81f69b791d896a5f0600269b48f55aa454242bf581e1d2e1b35e725fb595c86bbae30ef6cdeb7dfb42257bf8ef51cf7134b53a0985328da46838562f202dd9b2c862e59959a5fd5755080e019321e712c5dfc1b2b2f78db30bae08a0f3384fa44616c72442b9a606303ab98dcde21a95fe5029d5f04c783d26f21737bb9b9f8006e1e5f4498f3518d2238b3baff5e76de08f699cc25f643ed0759f2cfd7061c9c1fc249de9f648e6959592a202f8e099b915713d015896ffa5d7d1e4c40a948779a502d3e6c9c8c544c404720f6607a241650393fde7bf5c2063a3a9075cb9fdb3a421cf310dcf38ddc228444b0e2de4bc350fd6c45f6fc99fcec8bd919fe280ec85867f0bf0f049f4a49fbc25e3c1977a0c40e621424fa4846d24dafd28a5471130e1a25ad4103642e362febce1fa7b3410d36fac3841326ce61981d17ab6072e93890a813533a2ef56eb8f38adb7aa157f9e7fcda349493d291cddce6198adefe845186891431ecd7a3cd48e6b89ab373cedfddc55e17ee0ea2d2b349de29274b58a12803648288a7ba5a98763a66b8675ddf3605fdc286ec2b0754b73f135d8ce590b48e82cbce47d5427bf3f5ffd0ce7fbbe49ed766d02e077b0eed0e3fc691589d86e208df6529187d3faa46ba5fc6c24fc96f58aff544b6c2990983dab835aff7434f94dbc1f012cd19bb847050c7bb7d6916a2a0b64e971700083cd5e82392983ae8977fba2c4d98ecaf6aebf6d11840036148238d2214c91be4f167ff0be7cf06ddc5786bf57e66667ed6f7a8dc883f635cf845becc59f09ba4289e99b1f805335f15ef8bf90b588704bffa536c9b59ebb822e3d471c37b1bf089a49a0a0f8bbf928024f4953c455c31905fcc20bddd70a4b83066d3fd9e27a56d7348e3633abe95a5133945ce31c7d041f1747aebf0f551deab060e09ad5c761266ede6c0f27a96da731206cc443973296c715aa811bf2c6ab385afd2e575ffed39613c40c3e67ffe3a6a7cc7e35a2f966d24c82eb7a24e65da4e879c9436f8a247287d2506e8bdc0e6d12ef771c1f87f61e2afce7b1c3a9382e21ae3e2a420d820901210991dcea40cf91078b7468e12d866403663adc35891dd374b99d996f7e28546ff56ad9fed9d6fce6934bf7b5f167d4f4526ae81d3877fa52f0edb311db232eaf97c503f4f8622e1519ea17e827362eaae654b295bafec7784e471852d04c3abd38c19fabcc12d1d6c85d9580a00445e1871a0e48cc86ac6e3eb18e7860272db3be38ab2a71c5e9d02e86d464c20b4561a5dfd42a8cce104deeb487330b3dbad0b9304488b697843f7fd3737f0b3bee7cdbccdae2a6e45a4d3a92b53fe076af5ab2e9ad45d578a297d1bcb2d9aa1ad2f1c1e894597ed490c4e7a2d3859beb97d6a57bb06d1ee8109e2350a705f5baf855c5c0be57f47d2fc354c28010bddedc83f820a9f0661c9b85c5fd5991fa8ee0fcdf537f434743a008b87a555cdd86abfdebd45b5a2bebbf6b48a44205057a84796c8c6054fe3e12690033d4356174b2d478975425d9478917349ca60a26d79ed686292f2e006d4baf951a7de536b96f582e94de2a815dc39107194db71239fdbecd7ee611d4ae441e6886acabf090c2c2e1f4f655df7bde92d4969efdf2edefa1b9e3f83f766e9b88d9e8c95e5e6d2ac5c4dbd133234c5ec5c65f0086e84207706f74c262b5fdb3cbe13eec1db8bbdce738d4f4dd21e0381e930dbbbb2cb2728d21cd25304c42b87c7a4c039a1e2841069dab32e58d133173d164a6f2acd38a56e5fa899b2d8fc8bb63eab1cd74d416f78d6f3e658924d9f416fbf526e7c3795d9ffaf75528c109b9dd25ec3d380e52fd2b475362f9ff001e4e5b73bc2f2a19876800caa90f145588aeb83e76878d4ce4d7e8687ec2012d89752fbbda438c61aa863c308c540ae5c741769a38032808a87853136fed9164d7240dfb9b7baabcd5830aca574854d27d2ea078cbdf66a9e329977dcfe8d184e76a603c9e13c595152dca122ecdc9dedf8097b86a11119d8776bdd8f091a473a562f1d0f0847d08012a77618c21eac49d1ceeb1dd6312ff40420f109e8597c47c1976bf8c220ead6401371db163de5e76c021862be25a7620b399f6e671d5cfb39d5110386897b23057b443972a834032b1bf488ee769ccf96340f2c46841d549e3621486dc3be59d972e3c474d40dccddb58db66900f86480af024d5cf90c2378ab3f7c121e10f97c700cf03286dd9912fa278d955be34217fe302b596405cebe1d4825c053079b9201069db203c96a8ff80bbb49b0894c6f424d7fbf7965aa39daa2d41795ad922179898a9de64f642f7b02b1170a57e3663d0067f99fc6c0e0b4a851b4ea5ae12c6aa0dbc81ffeb6656e1037c2691df41bff813a095ebd95ded4418cfd0e717a9f3c52695f8a1f2e9e57bcbb65aa5c40760d1ccbf2810f53cc9a63cf2b622a01cf4d18f58f78ced2d4261230d6f1f7909d20c2014be0c5e1591cefccfccad0f32c0395ec2b7a4f90c0263277f38ff7ff437c813b8699d493de67d90776b052278d64a79c7b94573b581f205223297689810145ff97c7d9d1f7647d3177a2a1dbe99119dc008b51de568fe955c78148de3221de6c98cc39b6969eb16638b23330838676061e3fbc971c5d5fb7e412c284d228da054c2855567a2a96dd1a0d8309319e1402f5f5a9049b3bbf888c53589f34baf00996487741aa8706ed35fe72d0b7358b7fed808ce7d2b94cfa4d718e93a84712049ed1e53e65c2e227a166e95074a587066c3f5d97ab2b47816cb7c52b266c94831605fea47bc62aa7c2f16852aa1440b642cf809d6c1a110ad3f443675a219ff596b265ab70c21e1bab5d9209a975972ddedae9e02994721eea0bd318c3ac153d63443d6e3c0af700631066292f3781a12d8f812d10262871726e73731163a5ba0e56aa94213f8c226a86e79b30e40da3cd12373c3325d4b21c83fcf815890080fa5c868bb4689270de43a54d59775b5114cccf64d18a26a0dcd482ca6492b3bc8b3c945ace3ea6cc7ba36c9bf7b6ec4fda5af4330b08e100de127204b933eb71fb021921b0dbb7d1a69c4cd41040aa239074e1893cd2159b49184089cee861e4e3f34f4a051ade0c4e550c2194aee4c507683b7437707d2cd82ab25892c2254680d2ea96724e005e161949e6a5b0f7326966692e207e7741b119d4ce90ab7c3a56098f6151146bc5f42dd670d1fafc68159568cb1a81f9e184c951ad092bb0a08c9c6fc7b56a20702c5b867254161674c88372dcc6f9c55dabbf50dc374c0373233ce34dc874f653d49c6f42c02a593433dc297fba33706213621684bbf2e5588393f3915922f2d07cec7728fbaa752cfa49ed46b2e6e08600d642e8cadbb2e1eae960aecbab929d502ffc0f2f0c2f2e50e278ec7aee90caf5f12ced9c3db68416b32cec97883958a280ee5c95d210ebfc4de070b09a307f53ee7a7ff6eeac43efc92a7727ee384e4d7d48c31045ef7f24a08b6ba864d2c31f10d9df496eb431ed5dbeb59ece4e973a5c34e4f7a7c41a3c29d786d131d68cb26eb97da195b98e7ae0a814b6266cac3f24ea8c041b2a69bae2f0611a9d0fb93683c07eb8e3fe9b39fad4ce8dfda99b476e", 0xdd6}], 0x1) write$P9_RUNLINKAT(r5, &(0x7f00000005c0)={0x7}, 0x7) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r7, &(0x7f0000000600)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000000000000000000000000001000000000080000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000008f3f0000000000000000000000000000000000010000000000000000000000004f08a5c43f1e6028e4cdd4d99d0425cf5bdf903272f09b5c51fc0efa71a52702e7972932"], 0x1) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000980)="4acc582d79a664b845dfb8ee626a97eafc2a28e15d983cb110e823411f632d7041ff470738a9b7a5ea70f60278245a3464dd847146c05aad7d4ec68f4956390fe89703784898e641efc2a86854554b757ca0efe403f110e46481994ab09dbfadaa4cbe0079bc83eef7e47f40fd0f4f5af7d304968c963a19e20803b92b9cff7ded7f9cbc463e43c9a26b3d59e40ca26693f3310de13ac814276b90b9c7a4cb7613bdfafedcabc1a9595d4fe0928fdee85621275bc35fd9d2c2a4e6e63e63d4ead6ec198c7a68a59d76e528f8371024090186e540956371c7a429797c324068134d2230c98d93173ae680ab3b6416e2dc511c58c850d42cf2e115b44c9ba4b131067fe28e5ea9957ce4e58be93dc5038f264cbe37a739c6db8b5dd5812e31e95f95f210d10a56741fc91c6e6552d02e070d09e220cd89e67253a3a76470d0f6e0d43217b824f386b8a6d13198f55afcc51c8b23e4ac891f99ae7fdb341c08938f87346f86cd6b66ef82638b1e1ff361562b430d744359dd5dd6d5ee30c8b2d1357cd67f126b9eaf369877c0006c4c5e81a5c914f0cf028b1343d4b325b49c35e6c87f8ea7c9b8a1aad96ef2a7da871410824c8210637d75eca7156d4e955d19d3e45631414afcd62668b940e433ffa02b0269d42ebc3ddb803545a797be5471e0192b43c0b99899fa5d070f1c995721a00ecfc4507e0b8d518db888337eec3438a68dc4c44426f08d79115d5c63176bd8949569653913450f9e4d3b00ce4cf4a9d5bf8bfb94487225ae8369ef84001bcc38b7c455753f5790ec6aa5f8d3837a11b2c98e57e1b2cfd6cdeeb17de093bc41d8671c1af67525f1445effb54ef997469174b99c8b10416579666d3e9eb4f390baaf15cc1f0a1c77d7a5a5aa824c63a256724b451dfbffc7ceccd8665423e635130147c5d3c64b2c855f060a56a55b4619a8415d88b5447ad6ec3d077bff12b186b8639198d99d052b73b8a2449934be5c404cfbcce76b6cd127556a5de5b810a6e9edbdd78415b92f6c726b81337c8eab9e261a6cff077eec729f8ba460bb05d44b3825fa81adc066eec0d7c165ce345e09cea1fc40b5e7aedd991ac25dd58a59cee888231ef9b3325ff89bc0370142c4ae22e3cddeb0bcf5c7457311f255f62fbbff205e0510164f27ff9c30ec1369ef698152e88d7a3d1098a6090fb560cb2e0b92df2b0ea5b0ec813b4d2291c4c3c1baf57bc38cf20ad7cf473d7b5188be9350ac61d651eccdc34fe89b7088138982ca802022932ae594460af77bb05471ac389318cf046d536a753048364b03bb682aba6cb9597ff2fdb7f7fc64526a77d23c8deee6a84ff2f9b2215a100f8f99e5f53e31fcffc81f69b791d896a5f0600269b48f55aa454242bf581e1d2e1b35e725fb595c86bbae30ef6cdeb7dfb42257bf8ef51cf7134b53a0985328da46838562f202dd9b2c862e59959a5fd5755080e019321e712c5dfc1b2b2f78db30bae08a0f3384fa44616c72442b9a606303ab98dcde21a95fe5029d5f04c783d26f21737bb9b9f8006e1e5f4498f3518d2238b3baff5e76de08f699cc25f643ed0759f2cfd7061c9c1fc249de9f648e6959592a202f8e099b915713d015896ffa5d7d1e4c40a948779a502d3e6c9c8c544c404720f6607a241650393fde7bf5c2063a3a9075cb9fdb3a421cf310dcf38ddc228444b0e2de4bc350fd6c45f6fc99fcec8bd919fe280ec85867f0bf0f049f4a49fbc25e3c1977a0c40e621424fa4846d24dafd28a5471130e1a25ad4103642e362febce1fa7b3410d36fac3841326ce61981d17ab6072e93890a813533a2ef56eb8f38adb7aa157f9e7fcda349493d291cddce6198adefe845186891431ecd7a3cd48e6b89ab373cedfddc55e17ee0ea2d2b349de29274b58a12803648288a7ba5a98763a66b8675ddf3605fdc286ec2b0754b73f135d8ce590b48e82cbce47d5427bf3f5ffd0ce7fbbe49ed766d02e077b0eed0e3fc691589d86e208df6529187d3faa46ba5fc6c24fc96f58aff544b6c2990983dab835aff7434f94dbc1f012cd19bb847050c7bb7d6916a2a0b64e971700083cd5e82392983ae8977fba2c4d98ecaf6aebf6d11840036148238d2214c91be4f167ff0be7cf06ddc5786bf57e66667ed6f7a8dc883f635cf845becc59f09ba4289e99b1f805335f15ef8bf90b588704bffa536c9b59ebb822e3d471c37b1bf089a49a0a0f8bbf928024f4953c455c31905fcc20bddd70a4b83066d3fd9e27a56d7348e3633abe95a5133945ce31c7d041f1747aebf0f551deab060e09ad5c761266ede6c0f27a96da731206cc443973296c715aa811bf2c6ab385afd2e575ffed39613c40c3e67ffe3a6a7cc7e35a2f966d24c82eb7a24e65da4e879c9436f8a247287d2506e8bdc0e6d12ef771c1f87f61e2afce7b1c3a9382e21ae3e2a420d820901210991dcea40cf91078b7468e12d866403663adc35891dd374b99d996f7e28546ff56ad9fed9d6fce6934bf7b5f167d4f4526ae81d3877fa52f0edb311db232eaf97c503f4f8622e1519ea17e827362eaae654b295bafec7784e471852d04c3abd38c19fabcc12d1d6c85d9580a00445e1871a0e48cc86ac6e3eb18e7860272db3be38ab2a71c5e9d02e86d464c20b4561a5dfd42a8cce104deeb487330b3dbad0b9304488b697843f7fd3737f0b3bee7cdbccdae2a6e45a4d3a92b53fe076af5ab2e9ad45d578a297d1bcb2d9aa1ad2f1c1e894597ed490c4e7a2d3859beb97d6a57bb06d1ee8109e2350a705f5baf855c5c0be57f47d2fc354c28010bddedc83f820a9f0661c9b85c5fd5991fa8ee0fcdf537f434743a008b87a555cdd86abfdebd45b5a2bebbf6b48a44205057a84796c8c6054fe3e12690033d4356174b2d478975425d9478917349ca60a26d79ed686292f2e006d4baf951a7de536b96f582e94de2a815dc39107194db71239fdbecd7ee611d4ae441e6886acabf090c2c2e1f4f655df7bde92d4969efdf2edefa1b9e3f83f766e9b88d9e8c95e5e6d2ac5c4dbd133234c5ec5c65f0086e84207706f74c262b5fdb3cbe13eec1db8bbdce738d4f4dd21e0381e930dbbbb2cb2728d21cd25304c42b87c7a4c039a1e2841069dab32e58d133173d164a6f2acd38a56e5fa899b2d8fc8bb63eab1cd74d416f78d6f3e658924d9f416fbf526e7c3795d9ffaf75528c109b9dd25ec3d380e52fd2b475362f9ff001e4e5b73bc2f2a19876800caa90f145588aeb83e76878d4ce4d7e8687ec2012d89752fbbda438c61aa863c308c540ae5c741769a38032808a87853136fed9164d7240dfb9b7baabcd5830aca574854d27d2ea078cbdf66a9e329977dcfe8d184e76a603c9e13c595152dca122ecdc9dedf8097b86a11119d8776bdd8f091a473a562f1d0f0847d08012a77618c21eac49d1ceeb1dd6312ff40420f109e8597c47c1976bf8c220ead6401371db163de5e76c021862be25a7620b399f6e671d5cfb39d5110386897b23057b443972a834032b1bf488ee769ccf96340f2c46841d549e3621486dc3be59d972e3c474d40dccddb58db66900f86480af024d5cf90c2378ab3f7c121e10f97c700cf03286dd9912fa278d955be34217fe302b596405cebe1d4825c053079b9201069db203c96a8ff80bbb49b0894c6f424d7fbf7965aa39daa2d41795ad922179898a9de64f642f7b02b1170a57e3663d0067f99fc6c0e0b4a851b4ea5ae12c6aa0dbc81ffeb6656e1037c2691df41bff813a095ebd95ded4418cfd0e717a9f3c52695f8a1f2e9e57bcbb65aa5c40760d1ccbf2810f53cc9a63cf2b622a01cf4d18f58f78ced2d4261230d6f1f7909d20c2014be0c5e1591cefccfccad0f32c0395ec2b7a4f90c0263277f38ff7ff437c813b8699d493de67d90776b052278d64a79c7b94573b581f205223297689810145ff97c7d9d1f7647d3177a2a1dbe99119dc008b51de568fe955c78148de3221de6c98cc39b6969eb16638b23330838676061e3fbc971c5d5fb7e412c284d228da054c2855567a2a96dd1a0d8309319e1402f5f5a9049b3bbf888c53589f34baf00996487741aa8706ed35fe72d0b7358b7fed808ce7d2b94cfa4d718e93a84712049ed1e53e65c2e227a166e95074a587066c3f5d97ab2b47816cb7c52b266c94831605fea47bc62aa7c2f16852aa1440b642cf809d6c1a110ad3f443675a219ff596b265ab70c21e1bab5d9209a975972ddedae9e02994721eea0bd318c3ac153d63443d6e3c0af700631066292f3781a12d8f812d10262871726e73731163a5ba0e56aa94213f8c226a86e79b30e40da3cd12373c3325d4b21c83fcf815890080fa5c868bb4689270de43a54d59775b5114cccf64d18a26a0dcd482ca6492b3bc8b3c945ace3ea6cc7ba36c9bf7b6ec4fda5af4330b08e100de127204b933eb71fb021921b0dbb7d1a69c4cd41040aa239074e1893cd2159b49184089cee861e4e3f34f4a051ade0c4e550c2194aee4c507683b7437707d2cd82ab25892c2254680d2ea96724e005e161949e6a5b0f7326966692e207e7741b119d4ce90ab7c3a56098f6151146bc5f42dd670d1fafc68159568cb1a81f9e184c951ad092bb0a08c9c6fc7b56a20702c5b867254161674c88372dcc6f9c55dabbf50dc374c0373233ce34dc874f653d49c6f42c02a593433dc297fba33706213621684bbf2e5588393f3915922f2d07cec7728fbaa752cfa49ed46b2e6e08600d642e8cadbb2e1eae960aecbab929d502ffc0f2f0c2f2e50e278ec7aee90caf5f12ced9c3db68416b32cec97883958a280ee5c95d210ebfc4de070b09a307f53ee7a7ff6eeac43efc92a7727ee384e4d7d48c31045ef7f24a08b6ba864d2c31f10d9df496eb431ed5dbeb59ece4e973a5c34e4f7a7c41a3c29d786d131d68cb26eb97da195b98e7ae0a814b6266cac3f24ea8c041b2a69bae2f0611a9d0fb93683c07eb8e3fe9b39fad4ce8dfda99b476e19c55390311cdfe9331bf3fceb8d27f287acdfe9992d7ac728eea2", 0xdf1}], 0x1) write$P9_RUNLINKAT(r7, &(0x7f00000005c0)={0x7}, 0x7) write$P9_RREMOVE(r7, &(0x7f0000000200)={0x7}, 0x7) write$P9_ROPEN(r7, &(0x7f0000000040)={0x18, 0x71, 0xfffc, {{0x0, 0x20000}}}, 0x18) write$P9_RWRITE(r7, &(0x7f00000002c0)={0xb}, 0xb) sendfile(r6, r7, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_RREMOVE(r5, &(0x7f0000000200)={0x7}, 0x7) write$P9_RWRITE(r5, &(0x7f00000002c0)={0xb}, 0xb) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x24000, 0x0) r8 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r9 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r9, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000040000000000000000000000e4c9000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000008f3f000000000000000000000000000000000001000000000000000000000000000000000000003f"], 0x119) writev(r9, &(0x7f0000000000)=[{&(0x7f0000000980)="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", 0xa75}], 0x1) write$P9_RREMOVE(r9, &(0x7f0000000200)={0x7}, 0x7) write$P9_ROPEN(r9, &(0x7f0000000040)={0x18}, 0x18) write$P9_RWRITE(r9, &(0x7f00000002c0)={0xb}, 0xb) sendfile(r8, r9, 0x0, 0x8000fffffffe) ioctl$BLKTRACESTART(r9, 0x1274, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, 0x0, &(0x7f00000001c0)) ioctl$BLKTRACESTOP(r4, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 00:47:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000100)=ANY=[@ANYPTR64], 0x8) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r4, 0x10e, 0x5, 0x0, &(0x7f0000000100)) close(r4) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r1, 0x0, 0x8}) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)}], 0x1}, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, r5, 0x0, 0x0, 0x0) pipe(0x0) 00:47:33 executing program 5: fchdir(0xffffffffffffffff) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x3) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400, 0x1) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f0000000200)) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r3, &(0x7f0000000180)="8d734d86da7f53", 0x7, 0x80, &(0x7f00000001c0)={0xa, 0x4e20, 0x5, @ipv4={[], [], @remote}, 0x3f}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f00000001c0)=0x7) [ 814.685752] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 814.726115] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 814.753288] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "n¡”87geio=subj_role=reirfs" [ 814.757897] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:33 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x3}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 815.065088] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 815.084749] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:33 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xa, 0x80}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x22f, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x200000}, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) getpeername$unix(r1, &(0x7f00000000c0), &(0x7f0000000180)=0x6e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r4) sendmsg$netlink(r7, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[]}, 0x0) recvmmsg(r5, &(0x7f0000004b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001e80)=""/9, 0x9}, 0x3}], 0x1, 0x2, 0x0) 00:47:33 executing program 2: socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x5) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=r3, @ANYBLOB="00000000000000001c0016801800018014000a0000000000000000000400000000000000e72d48e3cd98c2b56787f55d8b69e96b6603b104a6c007a4761cdfc575784dff51f27e1ad9d970b29360a6bbddb4f3238e2e6da776904e7835b1a0a3ce5d0026aa268b996d2066d690d27017140ab0235e08f882c9a38ded990f139eee34190bb192640c322517a486deef4a8e808413658a63b1e200274cdb3c9804462ff2c00e95d72a785b38a2f7d3a9b9bdfb1d35773f9889929940224adebe58d4a61e2f9283495aab3d571d639da192cba66deaf5333560ce4285c1fe7347b92e704fec2c434a10175f86146e45a910"], 0x3c}}, 0x0) 00:47:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000140)="39a11059a2744b74add8423f4e52c653844d456a91bd2463ebd56522fa09e26046e0ebff1e88eb77b3494e6eaf922f5b0800bf0598b655c8fa476c1a19778954fd6e0dacd4765282e984150d4ca56e12ee8d5ea3484014af6035c3cd088f1e91b3eb052c86a616dfc62cb9487ef7", 0x6e, 0x40, 0x0, 0x0) 00:47:33 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x5, 0x0, &(0x7f0000000100)) dup(r0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:33 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x6}}, 0x1c}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4$nfc_llcp(r0, &(0x7f0000000300), &(0x7f0000000140)=0x60, 0x80000) r7 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r7, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r8 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r8, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r9 = dup2(r6, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 815.274955] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 815.302304] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 815.309204] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:34 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000140)=""/202, 0xca, 0x80, 0xffffceb9, 0x0, 0x1, 0x80}}, 0x120) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 815.318223] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 815.335970] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 815.378056] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 815.446709] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 815.616023] hid-generic 0000:0000:0000.0003: item fetching failed at offset 0/1 [ 815.724959] hid-generic: probe of 0000:0000:0000.0003 failed with error -22 00:47:34 executing program 0: socket(0x1, 0x5, 0x7e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x4, 0x8, 0x0, 0x800000000000}, 0x0) socket$inet6(0xa, 0x2, 0x0) shmget(0x2, 0x1000, 0x4, &(0x7f0000ffe000/0x1000)=nil) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r1, &(0x7f0000008880), 0x38, 0x20, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x2000, 0x3, 0xfffffffffffffffd}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000023980)=[{{&(0x7f000001e580)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f000001f900)=[{&(0x7f000001e600)=""/39, 0x27}, {&(0x7f000001e640)=""/148, 0x94}, {&(0x7f000001e700)=""/35, 0x23}, {&(0x7f000001e740)=""/4096, 0x1000}, {&(0x7f000001f740)=""/205, 0xcd}, {&(0x7f0000000740)=""/154, 0x93}], 0x6, &(0x7f000001f980)=""/33, 0x21}, 0x6}, {{&(0x7f000001f9c0)=@tipc=@id, 0x80, &(0x7f0000021d40)=[{&(0x7f000001fa40)=""/120, 0x78}, {&(0x7f0000001780)=""/4098, 0x1002}, {&(0x7f0000020ac0)=""/239, 0xef}, {&(0x7f0000020bc0)=""/4096, 0x1000}, {&(0x7f0000021bc0)=""/115, 0x73}], 0x5}}, {{0x0, 0x0, &(0x7f00000230c0), 0x0, &(0x7f0000023140)}, 0x7}, {{&(0x7f00000003c0)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000023200), 0x0, &(0x7f0000023240)=""/241, 0xf1}, 0x80000000}, {{&(0x7f0000023340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000023400), 0x0, &(0x7f0000000800)=""/107, 0x5c}, 0x4}, {{&(0x7f0000000540)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000023880)=[{&(0x7f0000023540)=""/43, 0x2b}, {&(0x7f0000023580)=""/218, 0xda}, {&(0x7f0000023680)=""/235, 0xeb}, {&(0x7f0000023780)=""/240, 0x23}], 0x4, &(0x7f00000238c0)=""/134, 0x86}, 0x1}], 0x6, 0x20, &(0x7f0000005380)={0x77359400}) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000053c0)=""/185, &(0x7f0000005480)=0xb9) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x200}) openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001200000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000008f3f000000000000000000000000000000000001000000000000000000000000000000000000003f"], 0x119) writev(r5, &(0x7f0000000000)=[{&(0x7f0000000980)="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", 0xdd6}], 0x1) write$P9_RUNLINKAT(r5, &(0x7f00000005c0)={0x7}, 0x7) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r7, &(0x7f0000000600)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000000000000000000000000001000000000080000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000008f3f0000000000000000000000000000000000010000000000000000000000004f08a5c43f1e6028e4cdd4d99d0425cf5bdf903272f09b5c51fc0efa71a52702e7972932"], 0x1) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000980)="4acc582d79a664b845dfb8ee626a97eafc2a28e15d983cb110e823411f632d7041ff470738a9b7a5ea70f60278245a3464dd847146c05aad7d4ec68f4956390fe89703784898e641efc2a86854554b757ca0efe403f110e46481994ab09dbfadaa4cbe0079bc83eef7e47f40fd0f4f5af7d304968c963a19e20803b92b9cff7ded7f9cbc463e43c9a26b3d59e40ca26693f3310de13ac814276b90b9c7a4cb7613bdfafedcabc1a9595d4fe0928fdee85621275bc35fd9d2c2a4e6e63e63d4ead6ec198c7a68a59d76e528f8371024090186e540956371c7a429797c324068134d2230c98d93173ae680ab3b6416e2dc511c58c850d42cf2e115b44c9ba4b131067fe28e5ea9957ce4e58be93dc5038f264cbe37a739c6db8b5dd5812e31e95f95f210d10a56741fc91c6e6552d02e070d09e220cd89e67253a3a76470d0f6e0d43217b824f386b8a6d13198f55afcc51c8b23e4ac891f99ae7fdb341c08938f87346f86cd6b66ef82638b1e1ff361562b430d744359dd5dd6d5ee30c8b2d1357cd67f126b9eaf369877c0006c4c5e81a5c914f0cf028b1343d4b325b49c35e6c87f8ea7c9b8a1aad96ef2a7da871410824c8210637d75eca7156d4e955d19d3e45631414afcd62668b940e433ffa02b0269d42ebc3ddb803545a797be5471e0192b43c0b99899fa5d070f1c995721a00ecfc4507e0b8d518db888337eec3438a68dc4c44426f08d79115d5c63176bd8949569653913450f9e4d3b00ce4cf4a9d5bf8bfb94487225ae8369ef84001bcc38b7c455753f5790ec6aa5f8d3837a11b2c98e57e1b2cfd6cdeeb17de093bc41d8671c1af67525f1445effb54ef997469174b99c8b10416579666d3e9eb4f390baaf15cc1f0a1c77d7a5a5aa824c63a256724b451dfbffc7ceccd8665423e635130147c5d3c64b2c855f060a56a55b4619a8415d88b5447ad6ec3d077bff12b186b8639198d99d052b73b8a2449934be5c404cfbcce76b6cd127556a5de5b810a6e9edbdd78415b92f6c726b81337c8eab9e261a6cff077eec729f8ba460bb05d44b3825fa81adc066eec0d7c165ce345e09cea1fc40b5e7aedd991ac25dd58a59cee888231ef9b3325ff89bc0370142c4ae22e3cddeb0bcf5c7457311f255f62fbbff205e0510164f27ff9c30ec1369ef698152e88d7a3d1098a6090fb560cb2e0b92df2b0ea5b0ec813b4d2291c4c3c1baf57bc38cf20ad7cf473d7b5188be9350ac61d651eccdc34fe89b7088138982ca802022932ae594460af77bb05471ac389318cf046d536a753048364b03bb682aba6cb9597ff2fdb7f7fc64526a77d23c8deee6a84ff2f9b2215a100f8f99e5f53e31fcffc81f69b791d896a5f0600269b48f55aa454242bf581e1d2e1b35e725fb595c86bbae30ef6cdeb7dfb42257bf8ef51cf7134b53a0985328da46838562f202dd9b2c862e59959a5fd5755080e019321e712c5dfc1b2b2f78db30bae08a0f3384fa44616c72442b9a606303ab98dcde21a95fe5029d5f04c783d26f21737bb9b9f8006e1e5f4498f3518d2238b3baff5e76de08f699cc25f643ed0759f2cfd7061c9c1fc249de9f648e6959592a202f8e099b915713d015896ffa5d7d1e4c40a948779a502d3e6c9c8c544c404720f6607a241650393fde7bf5c2063a3a9075cb9fdb3a421cf310dcf38ddc228444b0e2de4bc350fd6c45f6fc99fcec8bd919fe280ec85867f0bf0f049f4a49fbc25e3c1977a0c40e621424fa4846d24dafd28a5471130e1a25ad4103642e362febce1fa7b3410d36fac3841326ce61981d17ab6072e93890a813533a2ef56eb8f38adb7aa157f9e7fcda349493d291cddce6198adefe845186891431ecd7a3cd48e6b89ab373cedfddc55e17ee0ea2d2b349de29274b58a12803648288a7ba5a98763a66b8675ddf3605fdc286ec2b0754b73f135d8ce590b48e82cbce47d5427bf3f5ffd0ce7fbbe49ed766d02e077b0eed0e3fc691589d86e208df6529187d3faa46ba5fc6c24fc96f58aff544b6c2990983dab835aff7434f94dbc1f012cd19bb847050c7bb7d6916a2a0b64e971700083cd5e82392983ae8977fba2c4d98ecaf6aebf6d11840036148238d2214c91be4f167ff0be7cf06ddc5786bf57e66667ed6f7a8dc883f635cf845becc59f09ba4289e99b1f805335f15ef8bf90b588704bffa536c9b59ebb822e3d471c37b1bf089a49a0a0f8bbf928024f4953c455c31905fcc20bddd70a4b83066d3fd9e27a56d7348e3633abe95a5133945ce31c7d041f1747aebf0f551deab060e09ad5c761266ede6c0f27a96da731206cc443973296c715aa811bf2c6ab385afd2e575ffed39613c40c3e67ffe3a6a7cc7e35a2f966d24c82eb7a24e65da4e879c9436f8a247287d2506e8bdc0e6d12ef771c1f87f61e2afce7b1c3a9382e21ae3e2a420d820901210991dcea40cf91078b7468e12d866403663adc35891dd374b99d996f7e28546ff56ad9fed9d6fce6934bf7b5f167d4f4526ae81d3877fa52f0edb311db232eaf97c503f4f8622e1519ea17e827362eaae654b295bafec7784e471852d04c3abd38c19fabcc12d1d6c85d9580a00445e1871a0e48cc86ac6e3eb18e7860272db3be38ab2a71c5e9d02e86d464c20b4561a5dfd42a8cce104deeb487330b3dbad0b9304488b697843f7fd3737f0b3bee7cdbccdae2a6e45a4d3a92b53fe076af5ab2e9ad45d578a297d1bcb2d9aa1ad2f1c1e894597ed490c4e7a2d3859beb97d6a57bb06d1ee8109e2350a705f5baf855c5c0be57f47d2fc354c28010bddedc83f820a9f0661c9b85c5fd5991fa8ee0fcdf537f434743a008b87a555cdd86abfdebd45b5a2bebbf6b48a44205057a84796c8c6054fe3e12690033d4356174b2d478975425d9478917349ca60a26d79ed686292f2e006d4baf951a7de536b96f582e94de2a815dc39107194db71239fdbecd7ee611d4ae441e6886acabf090c2c2e1f4f655df7bde92d4969efdf2edefa1b9e3f83f766e9b88d9e8c95e5e6d2ac5c4dbd133234c5ec5c65f0086e84207706f74c262b5fdb3cbe13eec1db8bbdce738d4f4dd21e0381e930dbbbb2cb2728d21cd25304c42b87c7a4c039a1e2841069dab32e58d133173d164a6f2acd38a56e5fa899b2d8fc8bb63eab1cd74d416f78d6f3e658924d9f416fbf526e7c3795d9ffaf75528c109b9dd25ec3d380e52fd2b475362f9ff001e4e5b73bc2f2a19876800caa90f145588aeb83e76878d4ce4d7e8687ec2012d89752fbbda438c61aa863c308c540ae5c741769a38032808a87853136fed9164d7240dfb9b7baabcd5830aca574854d27d2ea078cbdf66a9e329977dcfe8d184e76a603c9e13c595152dca122ecdc9dedf8097b86a11119d8776bdd8f091a473a562f1d0f0847d08012a77618c21eac49d1ceeb1dd6312ff40420f109e8597c47c1976bf8c220ead6401371db163de5e76c021862be25a7620b399f6e671d5cfb39d5110386897b23057b443972a834032b1bf488ee769ccf96340f2c46841d549e3621486dc3be59d972e3c474d40dccddb58db66900f86480af024d5cf90c2378ab3f7c121e10f97c700cf03286dd9912fa278d955be34217fe302b596405cebe1d4825c053079b9201069db203c96a8ff80bbb49b0894c6f424d7fbf7965aa39daa2d41795ad922179898a9de64f642f7b02b1170a57e3663d0067f99fc6c0e0b4a851b4ea5ae12c6aa0dbc81ffeb6656e1037c2691df41bff813a095ebd95ded4418cfd0e717a9f3c52695f8a1f2e9e57bcbb65aa5c40760d1ccbf2810f53cc9a63cf2b622a01cf4d18f58f78ced2d4261230d6f1f7909d20c2014be0c5e1591cefccfccad0f32c0395ec2b7a4f90c0263277f38ff7ff437c813b8699d493de67d90776b052278d64a79c7b94573b581f205223297689810145ff97c7d9d1f7647d3177a2a1dbe99119dc008b51de568fe955c78148de3221de6c98cc39b6969eb16638b23330838676061e3fbc971c5d5fb7e412c284d228da054c2855567a2a96dd1a0d8309319e1402f5f5a9049b3bbf888c53589f34baf00996487741aa8706ed35fe72d0b7358b7fed808ce7d2b94cfa4d718e93a84712049ed1e53e65c2e227a166e95074a587066c3f5d97ab2b47816cb7c52b266c94831605fea47bc62aa7c2f16852aa1440b642cf809d6c1a110ad3f443675a219ff596b265ab70c21e1bab5d9209a975972ddedae9e02994721eea0bd318c3ac153d63443d6e3c0af700631066292f3781a12d8f812d10262871726e73731163a5ba0e56aa94213f8c226a86e79b30e40da3cd12373c3325d4b21c83fcf815890080fa5c868bb4689270de43a54d59775b5114cccf64d18a26a0dcd482ca6492b3bc8b3c945ace3ea6cc7ba36c9bf7b6ec4fda5af4330b08e100de127204b933eb71fb021921b0dbb7d1a69c4cd41040aa239074e1893cd2159b49184089cee861e4e3f34f4a051ade0c4e550c2194aee4c507683b7437707d2cd82ab25892c2254680d2ea96724e005e161949e6a5b0f7326966692e207e7741b119d4ce90ab7c3a56098f6151146bc5f42dd670d1fafc68159568cb1a81f9e184c951ad092bb0a08c9c6fc7b56a20702c5b867254161674c88372dcc6f9c55dabbf50dc374c0373233ce34dc874f653d49c6f42c02a593433dc297fba33706213621684bbf2e5588393f3915922f2d07cec7728fbaa752cfa49ed46b2e6e08600d642e8cadbb2e1eae960aecbab929d502ffc0f2f0c2f2e50e278ec7aee90caf5f12ced9c3db68416b32cec97883958a280ee5c95d210ebfc4de070b09a307f53ee7a7ff6eeac43efc92a7727ee384e4d7d48c31045ef7f24a08b6ba864d2c31f10d9df496eb431ed5dbeb59ece4e973a5c34e4f7a7c41a3c29d786d131d68cb26eb97da195b98e7ae0a814b6266cac3f24ea8c041b2a69bae2f0611a9d0fb93683c07eb8e3fe9b39fad4ce8dfda99b476e19c55390311cdfe9331bf3fceb8d27f287acdfe9992d7ac728eea2", 0xdf1}], 0x1) write$P9_RUNLINKAT(r7, &(0x7f00000005c0)={0x7}, 0x7) write$P9_RREMOVE(r7, &(0x7f0000000200)={0x7}, 0x7) write$P9_ROPEN(r7, &(0x7f0000000040)={0x18, 0x71, 0xfffc, {{0x0, 0x20000}}}, 0x18) write$P9_RWRITE(r7, &(0x7f00000002c0)={0xb}, 0xb) sendfile(r6, r7, &(0x7f0000d83ff8), 0x8000fffffffe) write$P9_RREMOVE(r5, &(0x7f0000000200)={0x7}, 0x7) write$P9_RWRITE(r5, &(0x7f00000002c0)={0xb}, 0xb) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x24000, 0x0) r8 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r9 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r9, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000040000000000000000000000e4c9000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000008f3f000000000000000000000000000000000001000000000000000000000000000000000000003f"], 0x119) writev(r9, &(0x7f0000000000)=[{&(0x7f0000000980)="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", 0xa75}], 0x1) write$P9_RREMOVE(r9, &(0x7f0000000200)={0x7}, 0x7) write$P9_ROPEN(r9, &(0x7f0000000040)={0x18}, 0x18) write$P9_RWRITE(r9, &(0x7f00000002c0)={0xb}, 0xb) sendfile(r8, r9, 0x0, 0x8000fffffffe) ioctl$BLKTRACESTART(r9, 0x1274, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, 0x0, &(0x7f00000001c0)) ioctl$BLKTRACESTOP(r4, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 00:47:34 executing program 1: ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "4491900b51fc953400", "6bdda720", "7ed51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) mkdirat(r3, &(0x7f0000000180)='./file0\x00', 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) ioctl$SIOCX25GFACILITIES(r4, 0x89e2, &(0x7f0000000140)) 00:47:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f00000001c0)=0x7) 00:47:34 executing program 5: fchdir(0xffffffffffffffff) r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x60) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000200), &(0x7f0000000240)=0x4) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$getenv(0x4201, r3, 0x81, &(0x7f0000000280)) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 815.892698] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 815.892743] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 815.914564] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:34 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000140)=0x100000000, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) [ 815.942754] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 815.947041] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000140)=0x2, 0x4) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 816.007556] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 816.047221] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:35 executing program 2: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000140)=""/202, 0xca, 0x80, 0xffffceb9, 0x0, 0x1, 0x80}}, 0x120) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 816.256926] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:35 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) syz_mount_image$tmpfs(&(0x7f0000000140)='tmpfs\x00', &(0x7f0000000180)='./file0\x00', 0x4, 0x2, &(0x7f0000000200)=[{&(0x7f0000000480)="a5476adc7f24cf437cfd219cc0b4961780e7fa2c8129a3ef510c227585fa44f55a82d155a26605ee0239c046410becfb73fb688bbc3877e72e1dd0c2853ced63f48f0e514e73429fcdcbe3dbc41ae649d48a2d94a6a5ed4cab0f1f117137177b31abecef9561b5923a03c8289c1a38f41f574ef83b3d7d0bfa1c83516c68784ae9456bbe0899b1c089b5fb88de383a34e50a07de8a43a21a11f47701af15d6de91644eeb48ac6892b276f48397839ed4ecfd8037dd103db0dbfd9068de753a1e4cb47a4025ef946207a800aef7e01eba13513c3094111f69bac2bcd85a11f87a1de14c87ab06d0c77a8fa6e0eca2d3fa69537d79f773fead081c2128a31886a94fa4672219e2a71fe9df3fda375b32ba55b960d8eb442413a2cdf3215240f37857cfbc54c9e1d90358201f18774edeca28188dbfec6ba7d2e90f61abe6c3080eca5abd5ff4da817987d0a4079c59899d6934344f6384e19aa2b918eb8387d37717a59f2082727342bebefef1348a123be7a46fa312e43417a273b7b1ce410698183b823987191334af5f0bc084087e7e57c20b8a4f322b90642e192df2adc80a4096108e174efbb813731213b29ad367819a4216ba6e466c95b01dc5df6c1326f04735f77f9a28c664c1e2dd2d8977f7cb723c844efa3b9b032164607fc63a8af2ae706d956bd7d1b0ab3cb804597554f07de75f3ae34162620e4561769ba51ad9ef9ea864e25e86e15a59c7505a46eca539a27077474e306e0d92213c8c4fb402bc5a03740f270b67a5160f6e2950efc4c5b4c85418e2275dc388b84ce922374357ea5fbdd6acb53a63411d3f4d79f2fcf12607a60136250967f15bc17ac02fe5d310b47433c85e98c355d9a01a9f535f11d1214a2662c54ee03384ec78806dbeb9fa120918d2375063baf9bcbb3d799381c63f72ff0041517f2290fc726b720e661359fd91d1f95c4809dd47d8f79c946e2bb634059aa6c83285834bca1505136d89d7786f0080705ed8b9df1861337e3e407035fda622e2e8124f45a5d4613c3630441dffbbc450feaa4298bafb2095fa8dfbb13885e9c528aceccddb3707b93e692f0ba376f4d95691dce5146f92185a277bb8a1933a8371c2383d8b7892a11f79c8600ba955d96ebc8a015b4662053fedef159478e2cd247e702167a46ed0104c60ce25e05db704a4755a20e48c8ac1d0e2d2bc83b4d25c8ce436c6f7c897631340e94d201f04484129b7f33515e845acfcf898466a2b8be4a7199393f6231c669b032429bbe56df9abd2cb42a9864b78e67eb0eabc47b10ea1bdc5c907d350e0bb1af3788811f687beea850fd4a743b577dede2b73b274338d651b500e41348eae28a8485865c624b90e5e06fda983119cbbad86a3f4280fa7fbe5b0796f0177c88948315582eea89657c4242c2347c18077498f20f36a2b9cf060c53bb6a589a54aadf1995dd73b5f86a143b9a1fb55239d510f0ca4f61b7149f93b60d94d52a716e167f8fb664ef0c2b4834404dda4c8c29ba6ad773dce3c513be6391176ac835bed65298d0adc83ca97bc94ebb77087441088436bfc651a10003bbe7c296934c43142640f2c24dc3f7cb29d023ad48a88377e8f2d97697eb507a737d24249200c1fa3ae10429b53d16a8357bbd7e4bbb4e64c877e6e264695f502860071aa35bc2a66252088cf4dee36b8c6f8fa5786bc501982ef03514838aab4f4a8b8f72aaaa63dc437084dd4a8046eaf201356d9d48a6d9639984b11328fcbc5b6a3951ab48ee4d706ae21cc62385e43fb3640e9c78a8a83d4a47fa509c337329237a1be114943eb68fd487375e7fd59a9e25cbdaae453b9cbe35b872a9ca657272bd3ce939ed2806a7db0fb89ab2cba9e19bd87a4bd034ae00db594959616bf7b3522c2c77e60f7ab218066f64c5c7b339e725ebce0d62b513af6aa5e019e76d354e77b2aba04619afdd94a2f80925318a3a522d6586cc5d6d2646168b80f53bc7c023496328d58fee9226bd9fb6aad76bf325fb5840171d28eb3bcbb76d853680738b2e09543038b22e3816679818c47d1537df240df3882ac6d0513e6ff4f290c3b41d4dd701dca312c093b6ec09d3a54b4efc2f11169501baf67673bfb92cb86af59fdfe45520433431edc743951102f8a14ca9e4b2b88154fde912c3f3294dbf15bdd40129c795b626a2b1997de7648ae7f9d3dbdf6609c8bad8ec5f53f8e38908565f23db980f09d6ae5319a50da38c78f7b1a41c7a97a24abe139259bbb16e147cfd612863989a40d58bac239073cb59a0c579e5362d7be70c7bb881221bc43bc0bad7933038d9a7d4ba1bb4071287785cd3ac7a957b66e23436ae06ba06a4abc033e50672b25c22616ebfc13316144c5cf3ddf0495cc2674a7c0357b2423428d4c1bae8f7baf117d53780ac30bd88f7cc368d8ae00f03cf481a137fdb6b10618af34a5ee64a689ac82c6830189fe96c378536d9db534afe111e3a692e08475c00f669f21abeb6f81d1ea93b66ab04163404a85c4c12b79d913defb3ac3bb65473e30c46bb457623e154af2382deb62aeabf6c2029fcba49b14e00e40966d725926da01f4feae7034b2fd741552e4116510d2897751cb01cffab0f650f370527b1d60f14875ca4687e4407d20d1fc00a9d15a59e72ab82eaed090ed5571a8fac7e34f420751aa4a3358c41531f57e7aeea15f6645165f14c419f2f9e26b45f60b23a0ba322607b1f7ce70257e855ef1ef7907893175e1b958bd2cab784854230b432f348b2516331cc1033c681a9682fe6e2346ffca725a707ff2eedd17f254b937c7c972abd93b6c7413f54fa15bd3dc701cfa7cc0c908f164911a407d8c322cf606ab6b87d79f89dd7b901d5112e42a4511d772b05fa82bf7a93efcbea26322f8834e10e6a5acdf52956a420b163957881e694617215d762415991c44682d368b1b148d34cbd5df0ad57d48954b5c344a37435110ae15d86fad8f409c013e0f6356258eaa95eadd44330207807e851d1a688c7a5dc4a9d8b3237211fbc258dee9e4f6d3438d2259c7686f639d20289704a145a3a4dc58d9f84e04a3698603dfe1df18e635b3c9f9f6b342d31a32d47225656763ac4bb39231f30ce19567a6c1c58c8dc2ba1aee12127f66b2b4feee2f62e2839662e487fbd849165d255e538dabe8564a8d64efa5123a3260068f7721f3fe7121281afd7ed6547f96baec17d71bc18325a182ef1edd61a44ba1c151026ad50a4137ad4b464a12f6b54194a03045f3a05322c2dcfca3026d49d44d1e268ad1324e0023992d818a9220f3122fe98c2e0cceeca1cee03da816231adb2ca689f8b9c9c1e4ade6c3b0685dcd0a0c6b9bea58ef3d802fe7c30363faf0de657e59e81ae7b9236efebb3f6dc5c3e5c6c44edfd440d2c003bf22a65c9ffd5d7103d4ace7959fe729373ad5a806d10f794e720696445115100ad66d6456887beb13b26b576ab23783c3aaec0436446daef1d217aedc2ef3d397d2ae13dede9611781c1f73b87ae9c8bfa200d5d75aafc5d27ea5ead441ad17dfc0ee7b0bdb9f4df5ed122e6da9a22909980b1c9da5fd9b9bc2ae309829da11cbeefcd305f5acdb91dfa4f3f9075adaad4a88d9ed9fc4cd94319e6130576bca0c4a867b114bc3920f548cf36ac67c325bee92df853c290655ee5444dd283c8f0e4177da347cc7ee9f0586aacc97f493327157e894b04d0822ac346341a0616e8b6154cdba70b135517c725d094ee5ab279101ff229c53005d01a8f9018c6503c193268179dcfc3c4ee2b825ec62303728d4bcc3a0082a94fc1fe8391c6175c7330cb71e3d512e44c485b658a6f367ed80b866ae0058c68b4f6ad8f902ff9d14c7f7adf384b4c98bc95a5f910ca1d8cc86bb45bf0fa13674fa5d12f3b7459d438f27116472f78247ca73c4488eb19986102dc492e491df7f2ed505f86421729c1fbcdadf37d07970c0002912dde3dc6d42bffbdd696c9b6da11d6c66ad13f66ded2cb13a8dec8ef43077b435c314de67a35560e3a06f9f513ef7aad680cfb522459621f2e615b34af9545f766df825ba6663c00d9420949f0a6189ac4b4f8713709416a38a56014f72f8b6759befeca8b89e58090e4e10e27b441dc67fcb2be14f29fe4ad46fbb7a8b2f33f7f9242693844b2647758b0be6c87cee86128d301074d0eae0dd7b34d01ef5d9b2fa000f5b8ae37514eb485d99dfafdea69527224eb0831c609fdfbd44e53784bfb2256e9bd0066572b7697a8dd9a82e9f64cca597ef2d17e5bd6d123a48a644a8929f6fd47d65cf18358171d1b9d009099aa3c2a45d7d911b1a607df3329a2c70ab9ba436460cc11023a57f6b42d8af0640d1b67440f1d2d9bcff7d1389c09025e197dcb510ed0188953db16072d5618977712cbd2791d06bbf40bc953e5025187f23f9beba50b3bf98e4b04f0da884f79f4709f1a96336c60240fb257eae5482b3a62a345ef86d04434e2496801159e6cd07baf8f23e196955d1e11f360738888cfcfe86d0e2098387fd761168e073111f36b434d4fb255ac33d7aabeb4e26bb1e07206381cbb97f902a83577c53591a525c6f9abddeb12f849d7daf16520ce8f57ad34adfb1823efdf2e01b468d30864c17292f2ef688de4fb3a6c96f91ce1b029404cd6bacf0b7ede7010f5931e061090766a2e134830d6963c535567028b0fc0190425cc32c9273e0ebcc5d0a932e6f48af6b2ef4ff45c5ed3048c6a26abba8189d3d2f85b0e27af27378709cb3486a7eda6bdc2252748017847bd3371ef03a10f83cebeb23b5fd9ebfeb6a44498939f2bf187b952fea8f1254714f36ba62db7cb54cb0a441a0329dae9c42eb150296aa1417610f33fbf0d142540d35461dfbab6e5e4e5222bad9f4231f17e1deb957421e431cf1d4f0993b487065c756e00945f01b979509b97a58dc840c74fb720ba51a91f8986f43d59179f54f32c9f50a3e05273815e7bf7e957ff8f434188bb3205c2273ddfc56aeb96c6c4a7a842aab72aaae7a553dfd6a5a9a6e455e18e0a833a4789e568cce3322b7200432e3db621963f18656496f55c7fda4e43516bdd71f4f41c67924cb713125d004e2ca4654dde380729367b7af407a0af1f541ce874daf8c6a476a6d4f8c2cbc1fb54446e7da5258d0ac3a87f5f1e93e4cdd40b993fcb455ba7c063e167a91f18597b4f425dd2906243ca553900e7d9749ff3dfa3391f0f53d837efd9fb0b0385dd310f699725f24056397c838a131b52a6fbfbe8e276996f01fbee1fa9589616f3df95ddc5000d994d0b06dd4498a5518e9bef62813379a7ece5b0bfa767d5a3361f7ae1935da788a659cb292fa28fa06a81996fdc437f766517f3d915fb5b6002cbca587b2a72d057d61835424cad54cbe8ba4605fa67faa9faf013be40585bd6c1936e8c997264457d51df9b77934735e4d3637d1b320d03786ce0dd37714f6f01d0b38ab692ef348b722be514c6b5e3468165d7d0c1276fa71b66b5609ea9cc01044638b1b1b395bfe5855519b86edff164e4d4d7c348c54baa3ebbb2740ae758e3cba243f1119e60e7a1e0146effb19c5243dd54957fa24826a40c0574339b3bae513d1cf207aee65f8ef132921d4111b7b7474de3c4657d717e0bd1d05ed495ff9ce8664548114d4bb80b981f4a6b8c733509b697c6ec4bb407f29bada8bd24c9972dd5fe73fbf6e8ea9a812bf4648638e582d4d3b87bd618c84d44e36304dc515426b22854a880c5831b47ecc97dee514e7a6f6c41ed96dfabe9c942f9ca39f95e9517a3e14b3592959", 0x1000, 0x6ce7}, {&(0x7f00000001c0), 0x0, 0xaeb6}], 0x0, &(0x7f0000000240)={[{@gid={'gid', 0x3d, r2}}, {@mode={'mode', 0x3d, 0x814e}}], [{@smackfshat={'smackfshat'}}, {@smackfsdef={'smackfsdef', 0x3d, 'procem0'}}, {@appraise='appraise'}, {@seclabel='seclabel'}, {@smackfsdef={'smackfsdef', 0x3d, 'tls\x00'}}, {@euid_lt={'euid<', r4}}, {@obj_type={'obj_type', 0x3d, '#*$\\'}}, {@obj_type={'obj_type', 0x3d, 'vboxnet0-#)'}}, {@seclabel='seclabel'}, {@smackfsdef={'smackfsdef', 0x3d, 'tls\x00'}}]}) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "042065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) sendmsg$can_raw(r2, &(0x7f00000003c0)={&(0x7f0000000280), 0x10, &(0x7f00000002c0)={&(0x7f0000000340)=@canfd={{0x0, 0x0, 0x0, 0x1}, 0x39, 0x3, 0x0, 0x0, "7223adb603e77e06de7fcf05ee167c103c96fda98e6d001bbcbdca429c729b494a24f03af0cb66c578ec0c987a75633a40100efceed1d22511bc42eea6b21bec"}, 0x48}}, 0x4001) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x1a4, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x11) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400000000e4ffffffffffffff", @ANYRES32=r6, @ANYBLOB="0000000000000004140012000c000100627269646765000004000200"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB='(\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r6, @ANYBLOB], 0x28}}, 0x0) 00:47:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000480)='batadv\x00') r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000075c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="eba700000000000000000c00000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xae0ceec5907c01cb) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="00042abd7000fcdbdf250700000008002b0014000000050030000100000008000b000400000008000300", @ANYRES32=r6, @ANYBLOB="05002f000000000008003af08cfa0d20940d5b577ef9a110503e00030000000800397f00000000000000000000000005002f0000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x880}, 0x4008000) [ 816.373407] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:35 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000140)) dup3(r0, r2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000004e00)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r6, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600000000000000000000004c169d9f9e93c32b77d167d78c99a5e08372bab4da01dd72a8604c438ec82e4b63a4"], 0x3c}}, 0x0) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r8, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_tcp_int(r8, 0x6, 0x4000000000014, &(0x7f0000000000)=0x80000000002, 0xe3) recvmmsg(r8, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000002c0)={r9, 0x1, 0x6, @dev={[], 0x1f}}, 0x10) setsockopt$inet_mreqn(r8, 0x0, 0x20, &(0x7f0000000100)={@multicast1, @empty, r9}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000480)=0xe8) recvmmsg(r5, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f00000004c0)=""/105, 0x69}, {&(0x7f0000000540)=""/37, 0x25}, {&(0x7f0000000580)=""/74, 0x4a}, {&(0x7f0000000600)=""/158, 0x9e}], 0x4}, 0x3}, {{&(0x7f0000000700)=@phonet, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000780)=""/180, 0xb4}, {&(0x7f0000000840)=""/28, 0x1c}, {&(0x7f0000000880)=""/161, 0xa1}, {&(0x7f0000000940)=""/171, 0xab}], 0x4, &(0x7f0000000a40)=""/228, 0xe4}, 0x1}, {{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000b40)=""/254, 0xfe}, {&(0x7f0000000c40)=""/193, 0xc1}, {&(0x7f0000000d40)=""/156, 0x9c}, {&(0x7f0000000e00)=""/155, 0x9b}], 0x4}, 0x6}, {{&(0x7f0000000f00)=@alg, 0x80, &(0x7f0000002280)=[{&(0x7f0000000f80)=""/251, 0xfb}, {&(0x7f0000001080)=""/210, 0xd2}, {&(0x7f0000001180)=""/235, 0xeb}, {&(0x7f0000001280)=""/4096, 0x1000}], 0x4}, 0x2}, {{0x0, 0x0, &(0x7f0000002480)=[{&(0x7f00000022c0)=""/179, 0xb3}, {&(0x7f0000002380)=""/156, 0x9c}, {&(0x7f0000002440)=""/20, 0x14}], 0x3}, 0x7f56}, {{&(0x7f00000024c0)=@rc={0x1f, @none}, 0x80, &(0x7f0000002880)=[{&(0x7f0000002540)=""/154, 0x9a}, {&(0x7f0000002600)=""/206, 0xce}, {&(0x7f0000002700)=""/115, 0x73}, {&(0x7f0000002780)=""/201, 0xc9}], 0x4, &(0x7f00000028c0)=""/162, 0xa2}, 0x7ff}, {{&(0x7f0000002980)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003cc0)=[{&(0x7f0000002a00)=""/177, 0xb1}, {&(0x7f0000002ac0)=""/32, 0x20}, {&(0x7f0000002b00)=""/89, 0x59}, {&(0x7f0000002b80)=""/222, 0xde}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000003c80)=""/62, 0x3e}], 0x6, &(0x7f0000003d40)=""/221, 0xdd}, 0x20}, {{&(0x7f0000003e40)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000004040)=[{&(0x7f0000003ec0)=""/118, 0x76}, {&(0x7f0000003f40)=""/249, 0xf9}], 0x2}, 0x8}, {{&(0x7f0000004080)=@nl=@proc, 0x80, &(0x7f0000004400)=[{&(0x7f0000004100)=""/207, 0xcf}, {&(0x7f0000004200)=""/178, 0xb2}, {&(0x7f00000042c0)=""/94, 0x5e}, {&(0x7f0000004340)=""/164, 0xa4}], 0x4, &(0x7f0000004440)=""/222, 0xde}, 0x8000}], 0x9, 0x1, 0x0) r12 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r12, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_tcp_int(r12, 0x6, 0x4000000000014, &(0x7f0000000000)=0x80000000002, 0xe3) recvmmsg(r12, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000002c0)={r13, 0x1, 0x6, @dev={[], 0x1f}}, 0x10) setsockopt$inet_mreqn(r12, 0x0, 0x20, &(0x7f0000000100)={@multicast1, @empty, r13}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000048c0)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f00000049c0)=0xe8) r15 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r15, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r15, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_tcp_int(r15, 0x6, 0x4000000000014, &(0x7f0000000000)=0x80000000002, 0xe3) recvmmsg(r15, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000002c0)={r16, 0x1, 0x6, @dev={[], 0x1f}}, 0x10) setsockopt$inet_mreqn(r15, 0x0, 0x20, &(0x7f0000000100)={@multicast1, @empty, r16}, 0xc) r17 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r17, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r17, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_tcp_int(r17, 0x6, 0x4000000000014, &(0x7f0000000000)=0x80000000002, 0xe3) recvmmsg(r17, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000002c0)={r18, 0x1, 0x6, @dev={[], 0x1f}}, 0x10) setsockopt$inet_mreqn(r17, 0x0, 0x20, &(0x7f0000000100)={@multicast1, @empty, r18}, 0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000004dc0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000004d80)={&(0x7f0000004a00)={0x344, r7, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8, 0x1, r6}, {0x124, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xfffffffd}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x8001}}}]}}, {{0x8, 0x1, r6}, {0x12c, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0xfff}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r11}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r6}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8, 0x6, r13}}}]}}, {{0x8, 0x1, r14}, {0xc8, 0x2, 0x0, 0x1, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r16}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8, 0x6, r18}}}]}}]}, 0x344}, 0x1, 0x0, 0x0, 0x1}, 0xc080) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000004780)=ANY=[@ANYBLOB="1c0000005e000100"/20, @ANYRES32=r6, @ANYBLOB="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"], 0x1c}}, 0x0) r19 = socket$inet6_tcp(0xa, 0x1, 0x0) r20 = dup2(r19, r19) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 816.418989] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 816.419306] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:35 executing program 3: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000140)=0x100000000, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) [ 816.473288] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 816.476908] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 816.525762] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 816.551063] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 00:47:35 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x420001, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video0\x00', 0x2, 0x0) ioctl$FICLONE(r1, 0x40049409, r2) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000140)=0x2, 0x4) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000140)=0x2, 0x4) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:35 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x9, 0x3}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') prctl$PR_SET_SECUREBITS(0x1c, 0x68) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r4, 0x10e, 0x5, 0x0, &(0x7f0000000100)) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x8801) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={0x0}}, 0x0) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0}, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) setsockopt$packet_drop_memb(r5, 0x107, 0x2, &(0x7f0000000480)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r6 = socket(0x10, 0x2, 0x0) write(r6, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) r7 = dup3(r2, 0xffffffffffffffff, 0x0) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000001840)='batadv\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001880)={0x0, @broadcast, @broadcast}, &(0x7f00000018c0)=0xc) sendmsg$BATADV_CMD_GET_ORIGINATORS(r7, &(0x7f00000019c0)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001980)={&(0x7f0000001900)={0x4c, r8, 0x2, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3f}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7fff}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x9}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x41}, 0x4000) r10 = getpid() sched_setscheduler(r10, 0x5, 0x0) [ 816.763074] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 816.771902] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 816.775588] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 816.801611] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000140)=0x2, 0x4) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 816.827907] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 816.836190] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:35 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) dup(r0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000000)={0x4, 0x1}) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) 00:47:35 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "c44fb8c736a1c7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430000051b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:35 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x400, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r1, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x30}, 0x1, 0x0, 0x0, 0x20008800}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @dev={0xfe, 0x80, [], 0x3b}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r2, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, 0xa, 0xa, 0x5, 0x0, 0x0, {0xa, 0x0, 0x3}, [@NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x10001}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x33}]}, 0x24}, 0x1, 0x0, 0x0, 0xc000880}, 0x10000850) [ 817.035391] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x30000, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r1, 0xc0045004, &(0x7f0000000180)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x1000074) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 817.095255] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 817.139926] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:36 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x6}}, 0x1c}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x40040, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 00:47:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) eventfd(0x0) fchdir(r0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) read$alg(r2, &(0x7f0000000300)=""/231, 0xe7) write$cgroup_type(r1, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r4 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r4, 0x5457, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x4, &(0x7f0000000180)=0x0) io_submit(r5, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x900000000000010, 0xc00000000000000, 0x80000000000000, 0x1, 0x0, r3, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 00:47:36 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) fcntl$setstatus(r2, 0x4, 0x800) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @local}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f00000003c0)={{0x87, @empty, 0x4e24, 0x1, 'ovf\x00', 0x4, 0x81, 0x28}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x5, 0x7fff, 0xffffffff, 0x800}}, 0x44) r3 = getuid() ioctl$SIOCAX25DELUID(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r3}) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) ioctl$KVM_GET_REGS(r6, 0x8090ae81, &(0x7f0000000300)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r7, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r7, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x5}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000280)={r8, 0x8, 0x3f, 0x8001, 0xfff, 0x40}, &(0x7f00000002c0)=0x14) preadv(r4, &(0x7f0000000180), 0x0, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r10, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r10, 0x84, 0x75, &(0x7f0000000440)={r9, 0x5}, &(0x7f0000000480)=0x8) accept4$vsock_stream(r4, &(0x7f0000000140)={0x28, 0x0, 0x2710, @host}, 0x10, 0x80800) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r11 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r11, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r12 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r11, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000640)={0x54, r12, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2f}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x7, 0x4}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @multicast1}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x40810}, 0x4000) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:36 executing program 3: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "c44fb8c736a1c7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430000051b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 817.300185] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 817.337754] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 817.343509] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r4, 0x10e, 0x5, 0x0, &(0x7f0000000100)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESHEX, @ANYRESHEX=r3, @ANYRESOCT=r2, @ANYRESHEX=r4, @ANYRESOCT=0x0, @ANYRESDEC=0x0, @ANYPTR], @ANYRESOCT], @ANYBLOB="0000000000000000db881e3fb4599c9b7cbbeeeacbe34a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 817.454903] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 817.520564] audit: type=1400 audit(1579913256.224:482): avc: denied { write } for pid=5534 comm="syz-executor.4" name="net" dev="proc" ino=175903 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 817.596170] audit: type=1400 audit(1579913256.254:483): avc: denied { add_name } for pid=5534 comm="syz-executor.4" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 00:47:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000016c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8b9e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca44e2649e57efc9d33d73cb488c4b4be802a2a42fce4b856ebb8fe3ad469afd174e24b961b8d16c91f4963696944fa79975820875b16a06dba16300"/258], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) getcwd(&(0x7f0000001800)=""/4096, 0x1000) dup(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$kcm(r1, &(0x7f0000000780)={&(0x7f00000004c0)=@nfc_llcp={0x27, 0x1, 0x0, 0x5, 0x5, 0x0, "72b3508a34b9af350c6331bb47c29b9d6a42b69a027edd585401a9969de987a56c1ceea0db06d3254a950632181df02eeebf67e6619ce400d529a41967e530", 0x18}, 0x80, 0x0}, 0x20000000) 00:47:36 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x6, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$SOUND_OLD_MIXER_INFO(r2, 0x80304d65, &(0x7f0000000180)) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) ioctl$KVM_SET_PIT2(r3, 0x4070aea0, &(0x7f00000001c0)={[{0x400, 0x2, 0x7f, 0x9, 0x3, 0x7, 0x66, 0x7f, 0x3, 0x1, 0x6, 0x80}, {0xf83, 0x66e4, 0xff, 0x4, 0x9, 0xdd, 0x4, 0x1, 0x1f, 0x3, 0x2, 0xf8, 0x7}, {0x80000000, 0x400, 0x1, 0xc4, 0x4, 0x3, 0x9, 0x20, 0xfb, 0xe1, 0xff, 0x1, 0xba}], 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x20040, 0x8) prctl$PR_SET_PDEATHSIG(0x1, 0x12) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:36 executing program 3: socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') syz_open_procfs(0x0, &(0x7f0000000300)='attr/sockcreate\x00') syz_open_procfs(0x0, &(0x7f0000001240)='maps\x00') mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$key(0xf, 0x3, 0x2) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r6, 0x0, r6) socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) accept4$alg(r7, 0x0, 0x0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r8, 0x0, r8) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) accept4$alg(r9, 0x0, 0x0, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) r11 = accept4$alg(r10, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-net\x00', 0x2, 0x0) r12 = creat(&(0x7f0000000300)='./file0\x00', 0x0) fcntl$dupfd(r2, 0x0, r12) fcntl$dupfd(r11, 0x0, r6) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r4) socket$inet6_tcp(0xa, 0x1, 0x0) r13 = socket$alg(0x26, 0x5, 0x0) bind$alg(r13, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) accept4$alg(r13, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) open(&(0x7f0000000100)='./bus\x00', 0x151443, 0x0) creat(&(0x7f0000000300)='./bus\x00', 0x6) creat(&(0x7f0000000300)='./file0\x00', 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r14, 0x0, r15) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r16, 0x0, r16) socket$inet6_tcp(0xa, 0x1, 0x0) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r17, 0x0, r17) r18 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r18, 0x0, r18) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x2, 0x3, 0x42) r19 = socket$inet(0x2, 0x3, 0x42) r20 = socket$inet(0x2, 0x3, 0x42) fcntl$dupfd(r19, 0x0, r20) socket$alg(0x26, 0x5, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) r21 = socket$inet_udplite(0x2, 0x2, 0x88) r22 = userfaultfd(0x0) ioctl$UFFDIO_API(r22, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r22, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r23 = socket$inet_udplite(0x2, 0x2, 0x88) r24 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r24, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) ioctl$sock_SIOCETHTOOL(r24, 0x8946, &(0x7f0000000140)={'syz_tun\x00', 0x0}) dup2(r23, r24) r25 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'macvlan0\x00', &(0x7f00000002c0)=ANY=[@ANYRES32=r25]}) r26 = dup2(r21, r1) dup3(r26, r22, 0x0) [ 817.634530] audit: type=1400 audit(1579913256.254:484): avc: denied { create } for pid=5534 comm="syz-executor.4" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 [ 817.728300] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 817.762682] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 817.784827] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 817.794888] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 817.806425] audit: type=1804 audit(1579913256.514:485): pid=5549 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir482722085/syzkaller.M7NdP1/1036/bus" dev="sda1" ino=17921 res=1 00:47:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) lseek(0xffffffffffffffff, 0x80, 0x6) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x304}, '\x00', "442065238829350ade76901f51fc9534", "7579d870", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:36 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "44206501000100000000000b51ec9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008012) [ 817.849362] audit: type=1804 audit(1579913256.514:486): pid=5549 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir482722085/syzkaller.M7NdP1/1036/bus" dev="sda1" ino=17921 res=1 [ 817.950832] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 817.957855] audit: type=1804 audit(1579913256.524:487): pid=5549 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir482722085/syzkaller.M7NdP1/1036/bus" dev="sda1" ino=17921 res=1 [ 817.995272] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 817.997488] audit: type=1804 audit(1579913256.524:488): pid=5549 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir482722085/syzkaller.M7NdP1/1036/bus" dev="sda1" ino=17921 res=1 [ 818.030610] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 818.044559] audit: type=1804 audit(1579913256.654:489): pid=5560 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir482722085/syzkaller.M7NdP1/1036/bus" dev="sda1" ino=17921 res=1 [ 818.088028] audit: type=1804 audit(1579913256.664:490): pid=5560 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir482722085/syzkaller.M7NdP1/1036/bus" dev="sda1" ino=17921 res=1 00:47:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x5, 0x0, &(0x7f0000000100)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fu=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRES64, @ANYBLOB=',group_id=', @ANYRESDEC=r0]) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r2) lchown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000380)=0x10000, 0x4) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r3) ioctl(0xffffffffffffffff, 0x10001, &(0x7f0000000100)="1e804f3bd8dc93c5390c3a035976b826370f28b89429ef04a8f5b0bce7efc1b4feb42c57b30414a053d4dde7dde9135ba7fbe2251276b1c31a8792990a593e100859839c1d36742810419783e3a4a2b0c7b33d43f75ea21cdb9aa9744cc580f5b9449b93f87a6cbccfe3de40ae72437273c4fce79cf63374d52582803c199b9b1c440b1f6f375a6be1723a1793d2dd11c46d5fa60196a709ab228435d91878b886419533d19522226dd739e0575747d60e8721891cc209908cc6f4d3d15d") ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000400)={0x4, 0xb, 0x4, 0x4000000, 0x8001, {}, {0x2, 0x8, 0x0, 0x4, 0x3, 0x8, "e1879766"}, 0x40, 0x2, @planes=&(0x7f00000003c0)={0x925c, 0x7f, @userptr=0x1, 0xffff}, 0xc6b, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_S_STD(r4, 0x40085618, &(0x7f0000000480)=0xf900) semget(0x1, 0x3, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f00000000c0)={0xfffffffd, 0x40006, 0x4, 0x300}) [ 818.178846] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 818.198577] audit: type=1804 audit(1579913256.664:491): pid=5560 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir482722085/syzkaller.M7NdP1/1036/bus" dev="sda1" ino=17921 res=1 00:47:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r1, 0x10e, 0x5, 0x0, &(0x7f0000000100)) sendfile(r0, r1, &(0x7f0000000400), 0xffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x402, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd53) sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYRESDEC=r3], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x90) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e24, @multicast1}, {0x1, @broadcast}, 0x2, {0x2, 0x4e22, @broadcast}, 'vxcan1\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000080)={0x0, 'veth1_vlan\x00', {0x903}, 0x100}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x181800, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file1\x00', 0x0, 0x10}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)='cgroup2\x00'}, 0x30) socket(0x10, 0x803, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x220040, 0x0) getsockopt$netlink(r7, 0x10e, 0x4, &(0x7f0000000140)=""/137, &(0x7f00000002c0)=0x89) r8 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000040)={0x80}) r9 = dup3(r5, r6, 0x0) dup2(r9, r8) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r10, &(0x7f00000017c0), 0x199, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r10, 0x65, 0x2, &(0x7f00000003c0)=0xffff, 0x4) 00:47:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20004004, &(0x7f0000000140)={0xa, 0x20004e22, 0x0, @dev={0xfe, 0x80, [], 0x12}, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) 00:47:37 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@ccm_128={{0x304}, "9f26b57fff545d2b", "5c1bdadc9b8da7e6631c9fb785ae71cd", "8a0ef34f", "7e29b7aba9bfdea3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:37 executing program 0: setrlimit(0x2, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d08, &(0x7f0000000080)=0x20) open(0x0, 0x141042, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x3, 0x0, 0x8020003) ioctl$KDGKBMETA(r1, 0x4b62, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5) socket$inet(0x2, 0x3, 0x2) fgetxattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB='securiuy.mountinfo\x00'], &(0x7f0000000140)=""/182, 0xb6) clone(0x20986100, 0x0, 0x0, 0x0, &(0x7f0000000040)="d353ff072d68b2e4dc14aa5f7e25908384") 00:47:37 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xe7, 0x80000) ioctl$SNDCTL_DSP_GETFMTS(r0, 0x8004500b, &(0x7f0000000080)=0x1) r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r1, &(0x7f00000000c0)={'system_u:object_r:crypt_device_t:s0', 0x20, 'system_u:object_r:setrans_var_run_t:s0', 0x20, 0x0, 0x20, 'system_u:system_r:kernel_t:s0\x00'}, 0x7e) 00:47:37 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x18, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x6}}, 0x1c}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x3ff}, 0x8) preadv(r8, &(0x7f00000017c0), 0x199, 0x0) getsockopt$inet_mreqn(r8, 0x0, 0x20, &(0x7f0000000300)={@multicast1, @dev, 0x0}, &(0x7f0000000340)=0xc) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r10, &(0x7f00000017c0), 0x199, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) r13 = socket$nl_netfilter(0x10, 0x3, 0xc) r14 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r13, r14, &(0x7f0000000040)=0x1, 0xe0) r15 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r15, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001100)={r16}, &(0x7f0000001140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r14, 0x84, 0x6d, &(0x7f0000000280)={r16, 0x36, "ac6a82d2b5acd821e04d0478a474e9c2be3b387e029887626c7e3cf456672c29c8210efff7d4d24bdf54e0b4d427ae9a6873dd3c164e"}, &(0x7f00000002c0)=0x3e) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r12, 0x84, 0x1b, &(0x7f0000000000)={r16}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440)={r16, 0xf9f}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r10, 0x84, 0x71, &(0x7f00000004c0)={r17, 0x3}, 0x8) recvfrom(r3, &(0x7f0000000140)=""/2, 0x2, 0x42, &(0x7f0000000380)=@ll={0x11, 0x4, r9, 0x1, 0xff, 0x6, @local}, 0x80) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 818.376571] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="726177000000000000000000003053000000000000000000000000000000000009000000030000003802000010010000a0010000000000000000000010010000a0010000a0010000a0010000a0010000a001000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000c800100100000000000000000000000000000000000000005800686173686c696d6974000000000000000000000000000010000000000001670000001080000000000010000000001b00000000000000ff0f0000000000000000000000040000ff0f00000020000000000000000000004800435400000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006a000000000000000000000000000000000000700090000000000000000000000000000000000000000000200054524143450000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000d563000000000000000000000000000000002800000000000000000000000006000000000000000000000000000000000000feffffff"], 0x1) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r7, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r7, &(0x7f0000000040)={0x2, 0x1000, @multicast1}, 0x10) splice(r6, 0x0, r7, 0x0, 0x30005, 0x0) r8 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x488100, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r8, 0x660c) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000140)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 818.417524] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:37 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000140)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 818.518917] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 818.543258] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 00:47:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}, 0x3}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, 0x4, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x8}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_COUNTERS={0x28, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xfdc9}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x6}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x800}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000057}, 0x4004004) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000fbdbdf250a0000001c00028006000f000300000006000e004e20000005000d00000000002c00028008000600bc000000080003000300000008000700090000000800040006000000080007000400000008000500df000000"], 0x64}, 0x1, 0x0, 0x0, 0x40}, 0x4000011) tkill(r2, 0x3c) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x10001}, 0x8) [ 818.565932] ip_tables: iptables: counters copy to user failed while replacing table [ 818.577743] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:37 executing program 5: fchdir(0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) fstat(r0, &(0x7f0000000140)) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r1, 0x10e, 0x5, 0x0, &(0x7f0000000100)) sendfile(r0, r1, &(0x7f0000000400), 0xffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x402, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd53) sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYRESDEC=r3], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x90) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e24, @multicast1}, {0x1, @broadcast}, 0x2, {0x2, 0x4e22, @broadcast}, 'vxcan1\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000080)={0x0, 'veth1_vlan\x00', {0x903}, 0x100}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x181800, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file1\x00', 0x0, 0x10}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)='cgroup2\x00'}, 0x30) socket(0x10, 0x803, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x220040, 0x0) getsockopt$netlink(r7, 0x10e, 0x4, &(0x7f0000000140)=""/137, &(0x7f00000002c0)=0x89) r8 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000040)={0x80}) r9 = dup3(r5, r6, 0x0) dup2(r9, r8) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r10, &(0x7f00000017c0), 0x199, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r10, 0x65, 0x2, &(0x7f00000003c0)=0xffff, 0x4) [ 818.657561] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 818.693808] selinux_nlmsg_perm: 412 callbacks suppressed [ 818.693820] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5605 comm=syz-executor.4 [ 818.712524] ip_tables: iptables: counters copy to user failed while replacing table [ 818.738952] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 818.755505] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 818.791561] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5605 comm=syz-executor.4 00:47:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000140)={0x0, {{0xa, 0x4e21, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7e8e}}, 0x0, 0x6, [{{0xa, 0x4e24, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}}, {{0xa, 0x4e23, 0xbdbacf8, @ipv4={[], [], @multicast1}, 0x90}}, {{0xa, 0x4e21, 0x7fffffff, @loopback, 0x78}}, {{0xa, 0x4e22, 0xaf64, @empty, 0x2}}, {{0xa, 0x4e20, 0x5, @mcast1, 0x5}}, {{0xa, 0x4e21, 0x3, @rand_addr="f528d81140180dfbb4b26e593f79d672", 0x7}}]}, 0x390) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:37 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000002c0)=0x1, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x100000}, 0x1c) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) statx(r2, &(0x7f0000000180)='./file0\x00', 0x4000, 0x4, &(0x7f00000001c0)) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "392065238929350ade91900b51fc9534", "6bdda720", "7ee51438da0451b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 818.792045] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 818.823733] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5605 comm=syz-executor.4 [ 818.838469] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5605 comm=syz-executor.4 [ 818.883656] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5605 comm=syz-executor.4 00:47:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r1, 0x10e, 0x5, 0x0, &(0x7f0000000100)) sendfile(r0, r1, &(0x7f0000000400), 0xffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x402, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd53) sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYRESDEC=r3], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x90) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e24, @multicast1}, {0x1, @broadcast}, 0x2, {0x2, 0x4e22, @broadcast}, 'vxcan1\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000080)={0x0, 'veth1_vlan\x00', {0x903}, 0x100}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x181800, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file1\x00', 0x0, 0x10}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)='cgroup2\x00'}, 0x30) socket(0x10, 0x803, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x220040, 0x0) getsockopt$netlink(r7, 0x10e, 0x4, &(0x7f0000000140)=""/137, &(0x7f00000002c0)=0x89) r8 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000040)={0x80}) r9 = dup3(r5, r6, 0x0) dup2(r9, r8) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r10, &(0x7f00000017c0), 0x199, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r10, 0x65, 0x2, &(0x7f00000003c0)=0xffff, 0x4) [ 818.938495] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5605 comm=syz-executor.4 [ 818.941820] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 818.956958] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5605 comm=syz-executor.4 [ 818.993881] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5605 comm=syz-executor.4 [ 819.004924] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 819.016175] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5605 comm=syz-executor.4 00:47:37 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x1d7) r1 = socket$inet_sctp(0x2, 0x801, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000000)=0xac3) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000040)=@hci={0x1f, 0xffffffffffffffff, 0x2}, 0x80, &(0x7f0000000980), 0x0, 0x0, 0x0, 0x9000004}, 0x0) [ 819.084566] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 819.092265] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5605 comm=syz-executor.4 [ 819.163976] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 00:47:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) fcntl$dupfd(r0, 0x0, r2) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:37 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x5e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x22240, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000180)={0x7f, 0xf0, 0x6}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r1, 0x10e, 0x5, 0x0, &(0x7f0000000100)) sendfile(r0, r1, &(0x7f0000000400), 0xffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x402, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfd53) sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYRESDEC=r3], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x90) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x4e24, @multicast1}, {0x1, @broadcast}, 0x2, {0x2, 0x4e22, @broadcast}, 'vxcan1\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000080)={0x0, 'veth1_vlan\x00', {0x903}, 0x100}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x181800, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file1\x00', 0x0, 0x10}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)='cgroup2\x00'}, 0x30) socket(0x10, 0x803, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x220040, 0x0) getsockopt$netlink(r7, 0x10e, 0x4, &(0x7f0000000140)=""/137, &(0x7f00000002c0)=0x89) r8 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000040)={0x80}) r9 = dup3(r5, r6, 0x0) dup2(r9, r8) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r10, &(0x7f00000017c0), 0x199, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r10, 0x65, 0x2, &(0x7f00000003c0)=0xffff, 0x4) 00:47:37 executing program 0: setrlimit(0x2, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d08, &(0x7f0000000080)=0x20) open(0x0, 0x141042, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x3, 0x0, 0x8020003) ioctl$KDGKBMETA(r1, 0x4b62, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5) socket$inet(0x2, 0x3, 0x2) fgetxattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB='securiuy.mountinfo\x00'], &(0x7f0000000140)=""/182, 0xb6) clone(0x20986100, 0x0, 0x0, 0x0, &(0x7f0000000040)="d353ff072d68b2e4dc14aa5f7e25908384") 00:47:38 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x20200, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@bridge_setlink={0x3a0, 0x13, 0x300, 0x70bd29, 0x25dfdbfc, {0x7, 0x0, 0x0, r5, 0x41220, 0x800}, [@IFLA_MTU={0x8, 0x4, 0x783d}, @IFLA_PHYS_SWITCH_ID={0x1c, 0x24, "948e4a54a7cf9c0cd7227c2f6dc5ab71b97778bc998a2c6c"}, @IFLA_EVENT={0x8, 0x2c, 0x3}, @IFLA_WEIGHT={0x8, 0xf, 0xffffff01}, @IFLA_VF_PORTS={0xf0, 0x18, 0x0, 0x1, [{0x90, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x200}, @IFLA_PORT_VF={0x8, 0x1, 0x40}, @IFLA_PORT_VF={0x8, 0x1, 0x3f}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "63ee2e2d13c552769332bcf95a87a8dc"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "8be29813307f497ff6d2a6ffcb3d9398"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "fab5c4cf7c5e24ee0ca75c119b1245b6"}, @IFLA_PORT_PROFILE={0xf, 0x2, 'em0cgroup^\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f327d73a16e73b17ca50f660deba7a00"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'trustedk\x15self.\x00'}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "879936ca602cec0eedd749ac0eb3e349"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "db30ba1c966cb2e4d99845ccdf18364e"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xd2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b9302fbef8d08dcfa9069fef69740efb"}, @IFLA_PORT_VF={0x8, 0x1, 0x83f}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x1f}]}]}, @IFLA_PORT_SELF={0x30, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "28569225736b040da65a14cbd4ac6cd5"}, @IFLA_PORT_PROFILE={0x18, 0x2, '\'selfwlan0mime_type\x00'}]}, @IFLA_VF_PORTS={0x21c, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "52445aa9ccf2e0c4826f02032c7b4f0c"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x20}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "9249e9382c5e4971e44efd4ea2932c9b"}, @IFLA_PORT_PROFILE={0xa, 0x2, '-proc\x00'}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xa, 0x2, '{)GPL\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x8e}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x2}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d44cd761c013be60fa9f5f7abd65fa8a"}, @IFLA_PORT_PROFILE={0x12, 0x2, 'em0\xedcpuset(.*\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_VF={0x8, 0x1, 0x17ccdc5f}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "90dbde7542deb866ab62b37cce9a130d"}, @IFLA_PORT_PROFILE={0x12, 0x2, 'trustedvmnet0\x00'}]}, {0x60, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xc9}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x81}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "6b82fb99eca201962ff67e4ce3a7ac43"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "197ef86994fa8ccd9116d01fa14044ab"}, @IFLA_PORT_VF={0x8, 0x1, 0x3}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "9c1a8d7784a9a074e1d44f25f6758f51"}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x3f}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7e55c690a9c71ffe06094c787bf832fe"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x6b}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "29deedc9b4f4d6cfa53ae4e5527d5822"}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_VF={0x8, 0x1, 0x1}]}, {0x28, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "b944e99608f3de94735bb309e20abda4"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x71}]}, {0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x1}, @IFLA_PORT_PROFILE={0x6, 0x2, ')\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "0170fdf3229f1abae3cc04d9722a07d5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x7f}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xf4}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "aaa397dbdbd7e53e19b96d634514ac49"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x6}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "10a1f22f09826ea7c8f747579c4dbb34"}]}]}, @IFLA_EVENT={0x8, 0x2c, 0x630a4e16}, @IFLA_CARRIER={0x5, 0x21, 0xc7}]}, 0x3a0}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r11, r12, &(0x7f0000000040)=0x1, 0xe0) r13 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r13, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001100)={r14}, &(0x7f0000001140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r12, 0x84, 0x6d, &(0x7f0000000280)={r14, 0x36, "ac6a82d2b5acd821e04d0478a474e9c2be3b387e029887626c7e3cf456672c29c8210efff7d4d24bdf54e0b4d427ae9a6873dd3c164e"}, &(0x7f00000002c0)=0x3e) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r10, 0x84, 0x1b, &(0x7f0000000000)={r14}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={r14, 0xb8, &(0x7f00000006c0)=[@in6={0xa, 0x4e20, 0x9, @remote, 0x7ff}, @in6={0xa, 0x4e20, 0x40, @mcast2, 0x1}, @in={0x2, 0x4e20, @rand_addr=0x9}, @in6={0xa, 0x4e24, 0xf1e00000, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}, @in6={0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0x1c}, 0xffff}, @in6={0xa, 0x4e21, 0x7, @mcast1, 0x401}, @in6={0xa, 0x4e24, 0xfffffffe, @dev={0xfe, 0x80, [], 0x39}, 0x5}]}, &(0x7f0000000780)=0x10) r15 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r15, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r16 = dup2(r15, 0xffffffffffffffff) getsockopt$CAN_RAW_FILTER(r16, 0x65, 0x1, &(0x7f00000007c0)=[{}, {}], &(0x7f0000000800)=0x10) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 00:47:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='io\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x1000002047ff) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) ioctl$SNDCTL_DSP_GETCAPS(r4, 0x8004500f, &(0x7f0000000000)) [ 819.285740] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 819.366176] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 819.379832] [ 819.381490] ====================================================== [ 819.387802] WARNING: possible circular locking dependency detected [ 819.394117] 4.14.167-syzkaller #0 Not tainted [ 819.398603] ------------------------------------------------------ [ 819.404908] syz-executor.2/5654 is trying to acquire lock: [ 819.410514] (&sig->cred_guard_mutex){+.+.}, at: [] do_io_accounting+0x1d6/0x7b0 [ 819.419676] [ 819.419676] but task is already holding lock: [ 819.425633] (&p->lock){+.+.}, at: [] seq_read+0xc1/0x1280 [ 819.432829] [ 819.432829] which lock already depends on the new lock. [ 819.432829] [ 819.441140] [ 819.441140] the existing dependency chain (in reverse order) is: [ 819.448751] [ 819.448751] -> #3 (&p->lock){+.+.}: [ 819.453858] lock_acquire+0x16f/0x430 [ 819.458229] __mutex_lock+0xe8/0x1470 [ 819.462540] mutex_lock_nested+0x16/0x20 [ 819.467113] seq_read+0xc1/0x1280 [ 819.471082] do_iter_read+0x3e2/0x5b0 [ 819.475389] vfs_readv+0xd3/0x130 [ 819.479352] default_file_splice_read+0x421/0x870 [ 819.484703] do_splice_to+0x105/0x170 [ 819.489012] splice_direct_to_actor+0x222/0x7b0 [ 819.494189] do_splice_direct+0x18d/0x230 [ 819.498852] do_sendfile+0x4db/0xbd0 [ 819.503085] SyS_sendfile64+0x102/0x110 [ 819.507577] do_syscall_64+0x1e8/0x640 [ 819.511974] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 819.517670] [ 819.517670] -> #2 (sb_writers#4){.+.+}: [ 819.523122] lock_acquire+0x16f/0x430 [ 819.527438] __sb_start_write+0x1ae/0x2f0 [ 819.532102] mnt_want_write+0x3f/0xb0 [ 819.536490] ovl_want_write+0x76/0xa0 [ 819.540805] ovl_create_object+0x79/0x1e0 [ 819.545496] ovl_create+0x28/0x30 [ 819.549458] lookup_open+0x11a6/0x1860 [ 819.553855] path_openat+0xfca/0x3f70 [ 819.558192] do_filp_open+0x18e/0x250 [ 819.562561] do_sys_open+0x2c5/0x430 [ 819.566786] SyS_open+0x2d/0x40 [ 819.570572] do_syscall_64+0x1e8/0x640 [ 819.574964] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 819.580657] [ 819.580657] -> #1 (&ovl_i_mutex_dir_key[depth]){++++}: [ 819.587408] lock_acquire+0x16f/0x430 [ 819.591712] down_read+0x3b/0xb0 [ 819.595637] path_openat+0x191c/0x3f70 [ 819.600038] do_filp_open+0x18e/0x250 [ 819.604352] do_open_execat+0xe7/0x4a0 [ 819.608749] do_execveat_common.isra.0+0x6d5/0x1dd0 [ 819.614271] SyS_execve+0x39/0x50 [ 819.618233] do_syscall_64+0x1e8/0x640 [ 819.622628] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 819.628319] [ 819.628319] -> #0 (&sig->cred_guard_mutex){+.+.}: [ 819.634636] __lock_acquire+0x2cb3/0x4620 [ 819.639289] lock_acquire+0x16f/0x430 [ 819.643601] __mutex_lock+0xe8/0x1470 [ 819.647921] mutex_lock_killable_nested+0x16/0x20 [ 819.653268] do_io_accounting+0x1d6/0x7b0 [ 819.657925] proc_tgid_io_accounting+0x23/0x30 [ 819.663012] proc_single_show+0xf0/0x160 [ 819.667575] seq_read+0x51a/0x1280 [ 819.671622] do_iter_read+0x3e2/0x5b0 [ 819.675925] vfs_readv+0xd3/0x130 [ 819.679898] default_file_splice_read+0x421/0x870 [ 819.685257] do_splice_to+0x105/0x170 [ 819.689580] splice_direct_to_actor+0x222/0x7b0 [ 819.694756] do_splice_direct+0x18d/0x230 [ 819.699523] do_sendfile+0x4db/0xbd0 [ 819.703756] SyS_sendfile64+0x102/0x110 [ 819.708238] do_syscall_64+0x1e8/0x640 [ 819.712635] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 819.718328] [ 819.718328] other info that might help us debug this: [ 819.718328] [ 819.726459] Chain exists of: [ 819.726459] &sig->cred_guard_mutex --> sb_writers#4 --> &p->lock [ 819.726459] [ 819.737136] Possible unsafe locking scenario: [ 819.737136] [ 819.743178] CPU0 CPU1 [ 819.747829] ---- ---- [ 819.752480] lock(&p->lock); [ 819.755571] lock(sb_writers#4); [ 819.761533] lock(&p->lock); [ 819.767143] lock(&sig->cred_guard_mutex); [ 819.771456] [ 819.771456] *** DEADLOCK *** [ 819.771456] [ 819.777505] 1 lock held by syz-executor.2/5654: [ 819.782155] #0: (&p->lock){+.+.}, at: [] seq_read+0xc1/0x1280 [ 819.789775] [ 819.789775] stack backtrace: [ 819.794263] CPU: 1 PID: 5654 Comm: syz-executor.2 Not tainted 4.14.167-syzkaller #0 [ 819.802037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 819.811401] Call Trace: [ 819.813984] dump_stack+0x142/0x197 [ 819.817602] ? vprintk_func+0x65/0x159 [ 819.821475] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 819.826836] __lock_acquire+0x2cb3/0x4620 [ 819.831072] ? is_bpf_text_address+0x7f/0x120 [ 819.835561] ? trace_hardirqs_on+0x10/0x10 [ 819.839790] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 819.844712] lock_acquire+0x16f/0x430 [ 819.848503] ? do_io_accounting+0x1d6/0x7b0 [ 819.852812] ? do_io_accounting+0x1d6/0x7b0 [ 819.857127] __mutex_lock+0xe8/0x1470 [ 819.860914] ? do_io_accounting+0x1d6/0x7b0 [ 819.865236] ? __lock_acquire+0x5f7/0x4620 [ 819.869470] ? kvmalloc_node+0x4e/0xe0 [ 819.873347] ? seq_read+0x916/0x1280 [ 819.877047] ? do_iter_read+0x3e2/0x5b0 [ 819.881008] ? do_io_accounting+0x1d6/0x7b0 [ 819.885319] ? do_splice_to+0x105/0x170 [ 819.889282] ? splice_direct_to_actor+0x222/0x7b0 [ 819.894110] ? do_sendfile+0x4db/0xbd0 [ 819.898013] ? mutex_trylock+0x1c0/0x1c0 [ 819.902068] ? trace_hardirqs_on+0x10/0x10 [ 819.906290] ? save_trace+0x290/0x290 [ 819.910078] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 819.914999] mutex_lock_killable_nested+0x16/0x20 [ 819.919828] ? find_held_lock+0x35/0x130 [ 819.923882] ? mutex_lock_killable_nested+0x16/0x20 [ 819.928891] do_io_accounting+0x1d6/0x7b0 [ 819.933043] ? get_pid_task+0x98/0x140 [ 819.936923] ? dname_to_vma_addr.isra.0+0x1f0/0x1f0 [ 819.941927] proc_tgid_io_accounting+0x23/0x30 [ 819.946496] proc_single_show+0xf0/0x160 [ 819.950546] seq_read+0x51a/0x1280 [ 819.954072] ? seq_lseek+0x3c0/0x3c0 [ 819.957772] ? security_file_permission+0x89/0x1f0 [ 819.962691] ? rw_verify_area+0xea/0x2b0 [ 819.966742] do_iter_read+0x3e2/0x5b0 [ 819.970531] vfs_readv+0xd3/0x130 [ 819.973973] ? compat_rw_copy_check_uvector+0x310/0x310 [ 819.979325] ? push_pipe+0x3e6/0x780 [ 819.983026] ? iov_iter_get_pages_alloc+0x2c9/0xef0 [ 819.988028] ? iov_iter_revert+0x9c0/0x9c0 [ 819.992248] ? iov_iter_pipe+0x9f/0x2c0 [ 819.996212] default_file_splice_read+0x421/0x870 [ 820.001047] ? __kmalloc+0x15d/0x7a0 [ 820.004746] ? alloc_pipe_info+0x15c/0x380 [ 820.008967] ? splice_direct_to_actor+0x5d2/0x7b0 [ 820.013813] ? do_splice_direct+0x18d/0x230 [ 820.018134] ? page_cache_pipe_buf_release+0x220/0x220 [ 820.023498] ? trace_hardirqs_on+0x10/0x10 [ 820.027723] ? save_trace+0x290/0x290 [ 820.031511] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 820.036436] ? rw_verify_area+0xea/0x2b0 [ 820.040486] ? page_cache_pipe_buf_release+0x220/0x220 [ 820.045751] do_splice_to+0x105/0x170 [ 820.049538] splice_direct_to_actor+0x222/0x7b0 [ 820.054205] ? generic_pipe_buf_nosteal+0x10/0x10 [ 820.059038] ? do_splice_to+0x170/0x170 [ 820.063000] ? rw_verify_area+0xea/0x2b0 [ 820.067050] do_splice_direct+0x18d/0x230 [ 820.071188] ? splice_direct_to_actor+0x7b0/0x7b0 [ 820.076022] ? rw_verify_area+0xea/0x2b0 [ 820.080069] do_sendfile+0x4db/0xbd0 [ 820.083772] ? do_compat_pwritev64+0x140/0x140 [ 820.088341] ? put_timespec64+0xb4/0x100 [ 820.092389] ? nsecs_to_jiffies+0x30/0x30 [ 820.096527] SyS_sendfile64+0x102/0x110 [ 820.100486] ? SyS_sendfile+0x130/0x130 [ 820.104463] ? do_syscall_64+0x53/0x640 [ 820.108510] ? SyS_sendfile+0x130/0x130 [ 820.112478] do_syscall_64+0x1e8/0x640 [ 820.116367] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 820.121201] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 820.126382] RIP: 0033:0x45b349 [ 820.129562] RSP: 002b:00007f18db0edc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 820.137261] RAX: ffffffffffffffda RBX: 00007f18db0ee6d4 RCX: 000000000045b349 [ 820.144520] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 820.151776] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 820.159050] R10: 00001000002047ff R11: 0000000000000246 R12: 00000000ffffffff 00:47:38 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000007680)={0x0, 0x5f, &(0x7f0000000140)={&(0x7f00000075c0)={0x1c, r4, 0xb631c6b8429a7eb, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r4, 0x100, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x401}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x14) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, &(0x7f0000000140)={0x4, 0x1, @raw_data=[0x3, 0x3d5e226c, 0x9e, 0x4, 0x0, 0x5e0, 0x24000000, 0x10001, 0x1, 0x1, 0x4, 0x7fffffff, 0x9, 0xee, 0x800, 0xffffffff]}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = accept$inet6(r5, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000200)=0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r7, &(0x7f00000017c0), 0x199, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r8, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f00000002c0)={0x8001001, 0x3, 0x1}) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f0000000240)={@dev}, &(0x7f0000000280)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x8, 0x2400) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 820.166307] R13: 00000000000008a6 R14: 00000000004ca018 R15: 000000000075bf2c [ 820.181636] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f0000000140)="66b9a203000066b80010000066ba004f8b2600000000640fc733c1ee6d0f01d10f01c23e0fc72e00f0440f20c0663502000000440f22c0baf80c66b8a803228466efbafc0c66b80000000066ef0f22dbb801018ec8", 0x53}], 0xaaaaaaaaaaaaaf8, 0xcffa808b513f9dec, 0x0, 0xf551c0d3d980a0d3) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r3, 0xaea2, 0x7f) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:47:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x15}}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x0, 0x7, 0x0, 0x8}, {0x4c9, 0x6, 0xb9, 0xe0}, {0x4, 0x3, 0x5, 0x1}, {0x6, 0x7, 0x20, 0x7}, {0xfffb, 0x5f, 0x5, 0x81}, {0x9, 0x24, 0x6, 0x7}, {0x7f, 0x7, 0xe9, 0x3}, {0x6, 0x0, 0x20, 0xffffff01}]}) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x4, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r1, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ftruncate(r1, 0xffffffffffff3f90) sendmmsg(r0, &(0x7f0000002dc0), 0x2d3, 0x0) [ 820.236806] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x40002, 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f77821b65726469727e4e5266696c65302c776f726b6469723d2e2f696c656fdbe70d752f47da0902a2a22700faa3f608db0e6f4060000000000000000000b24ac2162d968b9cd8343f4e0c70f32f5a559eaf180137322ddd6e988376e06e"]) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x402442, 0x0) ioctl$SNDRV_PCM_IOCTL_RESUME(0xffffffffffffffff, 0x4147, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/cache_stats\x00', 0x0, 0x0) futimesat(r2, &(0x7f0000000600)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0185879, 0x0) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, &(0x7f00000003c0)) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fchown(r3, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x4, 0x6, &(0x7f00000006c0)=""/225, &(0x7f0000000240)=0xe1) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYBLOB='\b\x00\x00\vH\x00', @ANYRES32], 0x3, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, 0x0) renameat(r4, &(0x7f0000000180)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') 00:47:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) listen(r3, 0xfffefffe) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ebd5551d03f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:39 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x101800, 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000100)}]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00a9820d6fc4d2306ec7c9c778e63d868492da0558bed82f89c4d7907d5bd2958f5f8a3b582101738b2af6"]) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000002c0)=0x0) geteuid() r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1a00}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x8}}, {@max_read={'max_read', 0x3d, 0x1000}}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@fowner_eq={'fowner', 0x3d, r8}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r9, &(0x7f0000000580)=ANY=[@ANYBLOB="000e090000000000aaada356df0000ec1bf4081e0044e09951d86c7b8b149d6527dcd99dc1258d53c3bd5b96e61585e19f8ed7baf09fca8051d81106a27ca7080ae5f4dc3460e12d10ca08f824206598318d66f6d7e4368a894421"], 0xf) fallocate(r9, 0x12, 0x28000000000, 0x8020003) writev(r9, &(0x7f0000000380)=[{0x0}], 0x1) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) r10 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, r11, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) lseek(r10, 0xfffffffffffffffd, 0x4) [ 820.339991] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:39 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_read_part_table(0x7fffffff, 0x6, &(0x7f00000024c0)=[{&(0x7f0000000140)="e27a9e8bc837eea952f800edd0fa6dfc52a6e82cbbf5fc", 0x17, 0x1}, {&(0x7f0000000300)="7243f3588371730cfc6aabe4c663fa0a89c673975642cac6ce862e3b1e15442d834f115c180d58cdb8be1cac1bdec5cf088d2a62bb", 0x35, 0x2}, {&(0x7f0000000340)="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", 0x1000, 0x8}, {&(0x7f0000001340)="89c1dda3a77c150efca627a83775b6fcf569d927692436fc8ac2d5f41d20eae0e906eaeec11111155db16e9ba531e1d8bdaf3c476cce2c319a533d578b9079de0bf96e75753b2b83efb6e6b1326d15a508aa7827f8fcaaa1ccaa10247a32d63a01476b057f1027cee540b6b72f9bfab4a813a3a4b0497897d355b0ce4c96e426a1", 0x81, 0xce1f}, {&(0x7f0000001400)="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", 0x1000, 0x1}, {&(0x7f0000002400)="97ce297e43f24b15173b15ba983f56b89bd1e5c5e29b31c2d53fd26803dca6994393d12087b31244a0830a7d90ab33fec61e00c061cd6b6acfd2e54a60d9173c99c5a7836b3bc074d5749438753c2c517868a34ee8d7db1cfb5d849d5ab7a50202438aaaf75438d064e2f47bc0be3f6baa5a7fa2026e2ae93facf5bc45aaf990225e403a24132a32474cb51d0c9dcd24abe64cdf21dcb1cc8c58c0a52254466cb28640af641cc92d46ccbedac4", 0xad, 0x100000001}]) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x6}}, 0x1c}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 00:47:39 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) r0 = getpid() sched_setattr(r0, &(0x7f0000003b40)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x23100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x80}, r0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r3 = accept4$tipc(0xffffffffffffffff, &(0x7f0000003bc0), &(0x7f0000003c00)=0x10, 0x80000) listen(r3, 0xffffffc1) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r4 = socket(0x1d, 0x800, 0x0) recvmmsg(r4, &(0x7f0000003900)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/205, 0xcd}, {&(0x7f0000000240)=""/124, 0x7c}, {&(0x7f00000002c0)=""/82, 0x52}, {&(0x7f0000000340)=""/89, 0x59}, {&(0x7f0000000480)=""/231, 0xe7}, {&(0x7f0000000580)=""/109, 0x6d}, {&(0x7f0000000600)=""/132, 0x84}], 0x7, &(0x7f00000003c0)=""/14, 0xe}, 0x4}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000740)=""/241, 0xf1}, {&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000001840)=""/199, 0xc7}], 0x3, &(0x7f0000001980)=""/187, 0xbb}, 0xa9}, {{&(0x7f0000001a40)=@nfc, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000001ac0)=""/2, 0x2}, {&(0x7f0000001b00)=""/192, 0xc0}], 0x2, &(0x7f0000001c00)=""/120, 0x78}, 0xfffffff7}, {{&(0x7f0000001c80)=@generic, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001d00)=""/232, 0xe8}, {&(0x7f0000001e00)=""/186, 0xba}, {&(0x7f0000001ec0)=""/30, 0x1e}, {&(0x7f0000001f00)=""/116, 0x74}], 0x4, &(0x7f0000001fc0)=""/4096, 0x1000}, 0x7fffffff}, {{&(0x7f0000002fc0)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f00000030c0)=[{&(0x7f0000003040)=""/78, 0x4e}], 0x1, &(0x7f0000003100)=""/79, 0x4f}, 0x14}, {{&(0x7f0000003180)=@hci, 0x80, &(0x7f00000032c0)=[{&(0x7f0000003200)=""/85, 0x55}, {&(0x7f0000003280)=""/35, 0x23}], 0x2, &(0x7f0000003300)=""/212, 0xd4}, 0x80000001}, {{&(0x7f0000003400)=@nl=@proc, 0x80, &(0x7f00000035c0)=[{&(0x7f0000003480)=""/226, 0xe2}, {&(0x7f0000003580)=""/63, 0x3f}], 0x2, &(0x7f0000003600)=""/186, 0xba}, 0x6}, {{&(0x7f00000036c0)=@vsock, 0x80, &(0x7f0000003840)=[{&(0x7f0000003740)=""/1, 0x1}, {&(0x7f0000003780)=""/174, 0xae}], 0x2, &(0x7f0000003880)=""/92, 0x5c}, 0x9}], 0x8, 0x40000020, &(0x7f0000003b00)={0x0, 0x1c9c380}) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000003b80)=0x3) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) getpeername$netlink(r2, &(0x7f0000000140), &(0x7f0000000180)=0xc) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0xc01, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_INTERFACE(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000000)={0x14, r5, 0xb0343aabd1184b87}, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r3, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x94, r5, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@NL80211_ATTR_FTM_RESPONDER={0x80, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0x3d, 0x3, "55d9360c3ff96fc0a8d234488e46b72e28321b21988cea16efbe6064aa65c6f256a862c11b1b80da5cedbd337b8cac312b6989fa15cbcfc344"}, @NL80211_FTM_RESP_ATTR_LCI={0x4}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0x25, 0x3, "16a1f567334b8b65512a7c80f36327139f4659368db2bcd07a12ad3c04008676bc"}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x85}, 0x1) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000001c0)=@gcm_128={{0x303}, "d6fdb51d0d50ff1d", "32a864dbf2d8f9b8fe839522e554cd2e", "44cb0437", "61d9b964e6b24084"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:39 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0xc00e, @rand_addr="004000006346d61bf450144a00"}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x2a002, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 820.485625] can: request_module (can-proto-0) failed. [ 820.489841] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 820.511408] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:39 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2164ed11, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$USBDEVFS_CONNECTINFO(0xffffffffffffffff, 0x40085511, &(0x7f0000000140)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 820.527899] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 00:47:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) getpeername$netlink(r2, &(0x7f0000000140), &(0x7f0000000180)=0xc) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0xc01, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_INTERFACE(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000000)={0x14, r5, 0xb0343aabd1184b87}, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r3, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x94, r5, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@NL80211_ATTR_FTM_RESPONDER={0x80, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0x3d, 0x3, "55d9360c3ff96fc0a8d234488e46b72e28321b21988cea16efbe6064aa65c6f256a862c11b1b80da5cedbd337b8cac312b6989fa15cbcfc344"}, @NL80211_FTM_RESP_ATTR_LCI={0x4}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0x25, 0x3, "16a1f567334b8b65512a7c80f36327139f4659368db2bcd07a12ad3c04008676bc"}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x85}, 0x1) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000001c0)=@gcm_128={{0x303}, "d6fdb51d0d50ff1d", "32a864dbf2d8f9b8fe839522e554cd2e", "44cb0437", "61d9b964e6b24084"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:47:39 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000480)=@security={'security\x00', 0xe, 0x4, 0x338, 0x208, 0x138, 0x208, 0x208, 0x0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x4, &(0x7f0000000140), {[{{@ip={@broadcast, @multicast2, 0xffffff00, 0xffffffff, 'bond_slave_1\x00', 'team0\x00', {0xff}, {}, 0xff, 0x1, 0x1}, 0x0, 0xf8, 0x138, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'veth1_macvtap\x00', {0xa, 0xef, 0x5, 0x0, 0x10000, 0x4299, 0xf8, 0x78, 0x78}, {0x7}}}, @common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x7f], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x20, 0x21, "45006d83a4796351890fb4c8b620a161d2e0fdb15b9eb889925ae0129134"}}}, {{@uncond, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7f}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x2, 0x2, 0x2}, {0x1, 0x6, 0x6}, {0x4, 0x5, 0x4}, 0x5, 0xffffd22e}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x1ff}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x398) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f00000003c0)={0x8000, 0x0, 'client1\x00', 0x2, "68883651b7dcecc4", "24e079d6752dc16f8a9bba8574b514bb9594fb2a338d09e9c2987fde32d05e93", 0x7}) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r2, 0xc2604110, &(0x7f0000000140)={0xfffffffe, [[0x7, 0x1, 0x10001, 0x10, 0xd761, 0xd3, 0xc825, 0xfffff000], [0x5, 0xfffffffe, 0x6, 0x4, 0x6, 0xb9f1, 0x1, 0x4], [0x2, 0x5, 0x400, 0xfffffffc, 0x5, 0x9, 0x8, 0x79e]], [], [{0x1, 0x2, 0x0, 0x1, 0x1}, {0x80000000, 0x2, 0x1, 0x1, 0x1, 0x1}, {0x0, 0xfc, 0x1, 0x0, 0x1}, {0x7f, 0x3, 0x1, 0x1, 0x1, 0x1}, {0x4, 0x1, 0x1, 0x0, 0x1, 0x1}, {0x0, 0x8531, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x208001, 0x0, 0x1, 0x1}, {0xfffffe00, 0x9, 0x1, 0x1, 0x1}, {0x5363, 0xfffffffc, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x40, 0x400, 0x0, 0x1, 0x1}, {0x1, 0x80000000, 0x1}], [], 0x3}) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) dup2(r3, r2) [ 820.683606] overlayfs: unrecognized mount option "low‚erdir~NRfile0" or missing value [ 820.720084] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 820.750502] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 820.773315] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 820.773924] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f00000003c0)={0x8000, 0x0, 'client1\x00', 0x2, "68883651b7dcecc4", "24e079d6752dc16f8a9bba8574b514bb9594fb2a338d09e9c2987fde32d05e93", 0x7}) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r2, 0xc2604110, &(0x7f0000000140)={0xfffffffe, [[0x7, 0x1, 0x10001, 0x10, 0xd761, 0xd3, 0xc825, 0xfffff000], [0x5, 0xfffffffe, 0x6, 0x4, 0x6, 0xb9f1, 0x1, 0x4], [0x2, 0x5, 0x400, 0xfffffffc, 0x5, 0x9, 0x8, 0x79e]], [], [{0x1, 0x2, 0x0, 0x1, 0x1}, {0x80000000, 0x2, 0x1, 0x1, 0x1, 0x1}, {0x0, 0xfc, 0x1, 0x0, 0x1}, {0x7f, 0x3, 0x1, 0x1, 0x1, 0x1}, {0x4, 0x1, 0x1, 0x0, 0x1, 0x1}, {0x0, 0x8531, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x208001, 0x0, 0x1, 0x1}, {0xfffffe00, 0x9, 0x1, 0x1, 0x1}, {0x5363, 0xfffffffc, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x40, 0x400, 0x0, 0x1, 0x1}, {0x1, 0x80000000, 0x1}], [], 0x3}) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) dup2(r3, r2) 00:47:39 executing program 3: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000007680)={0x0, 0x5f, &(0x7f0000000140)={&(0x7f00000075c0)={0x1c, r4, 0xb631c6b8429a7eb, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r4, 0x100, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x401}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x14) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, &(0x7f0000000140)={0x4, 0x1, @raw_data=[0x3, 0x3d5e226c, 0x9e, 0x4, 0x0, 0x5e0, 0x24000000, 0x10001, 0x1, 0x1, 0x4, 0x7fffffff, 0x9, 0xee, 0x800, 0xffffffff]}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = accept$inet6(r5, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000200)=0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r7, &(0x7f00000017c0), 0x199, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r8, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f00000002c0)={0x8001001, 0x3, 0x1}) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f0000000240)={@dev}, &(0x7f0000000280)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:39 executing program 0: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000007680)={0x0, 0x5f, &(0x7f0000000140)={&(0x7f00000075c0)={0x1c, r4, 0xb631c6b8429a7eb, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r4, 0x100, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x401}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x14) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, &(0x7f0000000140)={0x4, 0x1, @raw_data=[0x3, 0x3d5e226c, 0x9e, 0x4, 0x0, 0x5e0, 0x24000000, 0x10001, 0x1, 0x1, 0x4, 0x7fffffff, 0x9, 0xee, 0x800, 0xffffffff]}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = accept$inet6(r5, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000200)=0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r7, &(0x7f00000017c0), 0x199, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r8, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f00000002c0)={0x8001001, 0x3, 0x1}) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f0000000240)={@dev}, &(0x7f0000000280)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:39 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x1, 0x0) getsockname$ax25(r0, &(0x7f0000000180)={{0x3, @bcast}, [@bcast, @null, @rose, @remote, @bcast, @rose, @netrom, @rose]}, &(0x7f0000000200)=0x48) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000002c0)={0xa30000, 0x101, 0x9, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={0x98091b, 0x85, [], @p_u32=&(0x7f0000000240)=0x10000}}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000003c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000300), 0x3, {0xa, 0x4e21, 0x3, @loopback, 0x8}, r5}}, 0x38) [ 821.133301] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 821.149255] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 821.161573] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 821.164283] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 821.187554] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:39 executing program 0: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000007680)={0x0, 0x5f, &(0x7f0000000140)={&(0x7f00000075c0)={0x1c, r4, 0xb631c6b8429a7eb, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r4, 0x100, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x401}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x14) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, &(0x7f0000000140)={0x4, 0x1, @raw_data=[0x3, 0x3d5e226c, 0x9e, 0x4, 0x0, 0x5e0, 0x24000000, 0x10001, 0x1, 0x1, 0x4, 0x7fffffff, 0x9, 0xee, 0x800, 0xffffffff]}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = accept$inet6(r5, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000200)=0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r7, &(0x7f00000017c0), 0x199, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r8, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f00000002c0)={0x8001001, 0x3, 0x1}) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f0000000240)={@dev}, &(0x7f0000000280)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) sendto$inet6(r2, &(0x7f00000001c0)="26973846c56b1544c2af1e70ec981e2bd3b2b45dc9000000000000010046c8794cb4ed49dc0748bb4ecfbecceda5711b3bef2fb61f640870c86c076d33b9d23fe36d41e539a01486bcb27f850000fa07ab170ea940a2e4245e980382c64d34696f11293215318a66828b4097f154d52803563a1d61437df1c6b09164caf8586c6fbcb7d84c375728381e", 0xfffffffffffffcf2, 0x200080d0, 0x0, 0xfffffefe) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000280)={0x0, 0x0}) fcntl$setownex(r3, 0xf, &(0x7f0000000080)={0x6, r4}) 00:47:39 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) connect$unix(r2, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000070) 00:47:39 executing program 3: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000007680)={0x0, 0x5f, &(0x7f0000000140)={&(0x7f00000075c0)={0x1c, r4, 0xb631c6b8429a7eb, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r4, 0x100, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x401}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x14) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, &(0x7f0000000140)={0x4, 0x1, @raw_data=[0x3, 0x3d5e226c, 0x9e, 0x4, 0x0, 0x5e0, 0x24000000, 0x10001, 0x1, 0x1, 0x4, 0x7fffffff, 0x9, 0xee, 0x800, 0xffffffff]}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = accept$inet6(r5, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000200)=0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r7, &(0x7f00000017c0), 0x199, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r8, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f00000002c0)={0x8001001, 0x3, 0x1}) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f0000000240)={@dev}, &(0x7f0000000280)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:40 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r4, 0x10e, 0x5, 0x0, &(0x7f0000000100)) pwrite64(r4, &(0x7f0000000300)="67d1c55e20e9692738d4f9b54559362db8f98ec79e4539d83981bc7fd260afd999ec26800458b9df70a8cfd9b68f776d1e253566fbf5b38a074e38c76a1a4763a08db0cf2c329d9f83e1929a436b572f5ca09a8768af2e", 0x57, 0xc5d) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r7, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6}}, 0x1c}}, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 821.288699] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 821.306832] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 821.308645] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f00000003c0)={0x8000, 0x0, 'client1\x00', 0x2, "68883651b7dcecc4", "24e079d6752dc16f8a9bba8574b514bb9594fb2a338d09e9c2987fde32d05e93", 0x7}) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r2, 0xc2604110, &(0x7f0000000140)={0xfffffffe, [[0x7, 0x1, 0x10001, 0x10, 0xd761, 0xd3, 0xc825, 0xfffff000], [0x5, 0xfffffffe, 0x6, 0x4, 0x6, 0xb9f1, 0x1, 0x4], [0x2, 0x5, 0x400, 0xfffffffc, 0x5, 0x9, 0x8, 0x79e]], [], [{0x1, 0x2, 0x0, 0x1, 0x1}, {0x80000000, 0x2, 0x1, 0x1, 0x1, 0x1}, {0x0, 0xfc, 0x1, 0x0, 0x1}, {0x7f, 0x3, 0x1, 0x1, 0x1, 0x1}, {0x4, 0x1, 0x1, 0x0, 0x1, 0x1}, {0x0, 0x8531, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x208001, 0x0, 0x1, 0x1}, {0xfffffe00, 0x9, 0x1, 0x1, 0x1}, {0x5363, 0xfffffffc, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x40, 0x400, 0x0, 0x1, 0x1}, {0x1, 0x80000000, 0x1}], [], 0x3}) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) dup2(r3, r2) [ 821.333705] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 821.334730] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 821.356232] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 00:47:40 executing program 3: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000007680)={0x0, 0x5f, &(0x7f0000000140)={&(0x7f00000075c0)={0x1c, r4, 0xb631c6b8429a7eb, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r4, 0x100, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x401}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x14) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, &(0x7f0000000140)={0x4, 0x1, @raw_data=[0x3, 0x3d5e226c, 0x9e, 0x4, 0x0, 0x5e0, 0x24000000, 0x10001, 0x1, 0x1, 0x4, 0x7fffffff, 0x9, 0xee, 0x800, 0xffffffff]}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = accept$inet6(r5, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000200)=0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r7, &(0x7f00000017c0), 0x199, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r8, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f00000002c0)={0x8001001, 0x3, 0x1}) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f0000000240)={@dev}, &(0x7f0000000280)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:40 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000200)=@gcm_256={{0x304}, "2cbf4bca4d87927b", "6c94e6de7992710a040a94bec566a287b83ba5350bad25a5bcc62187037ba96f", "0002a033", "50b70c1f8adc4e51"}, 0xfffffffffffffff2) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000000140)={0x0, @bt={0x10000, 0x55, 0x0, 0x1, 0x6, 0x3, 0x9f, 0x1, 0xfffffff7, 0x7fff, 0xd5, 0x3, 0x0, 0x6, 0x18, 0x1, {0x40, 0x7}, 0x3, 0x1}}) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ftruncate(r2, 0x2) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 821.394842] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_256={{0x304}, "641d5dfc6ae000", "3bdd7626f3cf641c14d1085f676c5a5e67c7ce717dad03a2d0bca14e2b1036c1", "08000204", "4a8a7940e3e93d2b"}, 0x2d) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 821.440710] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 821.455442] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 821.470099] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:40 executing program 0: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000007680)={0x0, 0x5f, &(0x7f0000000140)={&(0x7f00000075c0)={0x1c, r4, 0xb631c6b8429a7eb, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r4, 0x100, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x401}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x14) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, &(0x7f0000000140)={0x4, 0x1, @raw_data=[0x3, 0x3d5e226c, 0x9e, 0x4, 0x0, 0x5e0, 0x24000000, 0x10001, 0x1, 0x1, 0x4, 0x7fffffff, 0x9, 0xee, 0x800, 0xffffffff]}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = accept$inet6(r5, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000200)=0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r7, &(0x7f00000017c0), 0x199, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r8, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f00000002c0)={0x8001001, 0x3, 0x1}) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f0000000240)={@dev}, &(0x7f0000000280)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f00000003c0)={0x8000, 0x0, 'client1\x00', 0x2, "68883651b7dcecc4", "24e079d6752dc16f8a9bba8574b514bb9594fb2a338d09e9c2987fde32d05e93", 0x7}) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r2, 0xc2604110, &(0x7f0000000140)={0xfffffffe, [[0x7, 0x1, 0x10001, 0x10, 0xd761, 0xd3, 0xc825, 0xfffff000], [0x5, 0xfffffffe, 0x6, 0x4, 0x6, 0xb9f1, 0x1, 0x4], [0x2, 0x5, 0x400, 0xfffffffc, 0x5, 0x9, 0x8, 0x79e]], [], [{0x1, 0x2, 0x0, 0x1, 0x1}, {0x80000000, 0x2, 0x1, 0x1, 0x1, 0x1}, {0x0, 0xfc, 0x1, 0x0, 0x1}, {0x7f, 0x3, 0x1, 0x1, 0x1, 0x1}, {0x4, 0x1, 0x1, 0x0, 0x1, 0x1}, {0x0, 0x8531, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x208001, 0x0, 0x1, 0x1}, {0xfffffe00, 0x9, 0x1, 0x1, 0x1}, {0x5363, 0xfffffffc, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x40, 0x400, 0x0, 0x1, 0x1}, {0x1, 0x80000000, 0x1}], [], 0x3}) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) dup2(r3, r2) [ 821.503439] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:40 executing program 3: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000007680)={0x0, 0x5f, &(0x7f0000000140)={&(0x7f00000075c0)={0x1c, r4, 0xb631c6b8429a7eb, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r4, 0x100, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x401}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x14) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, &(0x7f0000000140)={0x4, 0x1, @raw_data=[0x3, 0x3d5e226c, 0x9e, 0x4, 0x0, 0x5e0, 0x24000000, 0x10001, 0x1, 0x1, 0x4, 0x7fffffff, 0x9, 0xee, 0x800, 0xffffffff]}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = accept$inet6(r5, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000200)=0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r7, &(0x7f00000017c0), 0x199, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r8, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f00000002c0)={0x8001001, 0x3, 0x1}) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f0000000240)={@dev}, &(0x7f0000000280)=0x14) 00:47:40 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7d, 0x81}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x4, 0xfd) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0x23}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000140)) [ 821.552541] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 821.552593] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 821.578665] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 821.589252] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) vmsplice(r2, &(0x7f0000000200)=[{&(0x7f0000000180)="2b47e86c650d42db24d23e14f71eeae71309ea72232978a109692d73b8e68873b163e2063a62946415612094c3a29e4b503f59e259930a0264a86cd0145c536c7cdb639097b13d01d72d54b7b9cdff62d832823392", 0x55}], 0x1, 0xa) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r3, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x48, r4, 0x300, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7f714fcd}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7e}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0xa260b161e935dc1d) r5 = socket$tipc(0x1e, 0x2, 0x0) recvfrom(r5, &(0x7f0000000240)=""/47, 0x2f, 0x10000, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000280)="6ea215ba60e158ea80e785ea490a4a7541e0727c8e03617c2e5c3d2027c52f10e12f6e27d398d51a62156609109f5249548c70acf9bd3cc3504d466afdbeaddb2e8b9e77d829e47a44083234dddbbf648efc1045c00df234ba79e32393c491ebd567715382f2ad11daf5e695e1b2692003a0d361f2763f849ad112d6ddef12744703472a243e10e5e5b542c72924504e1b1068", 0x93, 0x40, 0x0, 0x0) [ 821.622524] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 821.634926] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:40 executing program 3: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000007680)={0x0, 0x5f, &(0x7f0000000140)={&(0x7f00000075c0)={0x1c, r4, 0xb631c6b8429a7eb, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r4, 0x100, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x401}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x14) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, &(0x7f0000000140)={0x4, 0x1, @raw_data=[0x3, 0x3d5e226c, 0x9e, 0x4, 0x0, 0x5e0, 0x24000000, 0x10001, 0x1, 0x1, 0x4, 0x7fffffff, 0x9, 0xee, 0x800, 0xffffffff]}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) accept$inet6(r5, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000200)=0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r7, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f00000002c0)={0x8001001, 0x3, 0x1}) [ 821.664629] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 821.721134] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:40 executing program 0: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000007680)={0x0, 0x5f, &(0x7f0000000140)={&(0x7f00000075c0)={0x1c, r4, 0xb631c6b8429a7eb, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r4, 0x100, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x401}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x14) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, &(0x7f0000000140)={0x4, 0x1, @raw_data=[0x3, 0x3d5e226c, 0x9e, 0x4, 0x0, 0x5e0, 0x24000000, 0x10001, 0x1, 0x1, 0x4, 0x7fffffff, 0x9, 0xee, 0x800, 0xffffffff]}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = accept$inet6(r5, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000200)=0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r7, &(0x7f00000017c0), 0x199, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r8, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f00000002c0)={0x8001001, 0x3, 0x1}) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f0000000240)={@dev}, &(0x7f0000000280)=0x14) 00:47:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f00000003c0)={0x8000, 0x0, 'client1\x00', 0x2, "68883651b7dcecc4", "24e079d6752dc16f8a9bba8574b514bb9594fb2a338d09e9c2987fde32d05e93", 0x7}) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r2, 0xc2604110, &(0x7f0000000140)={0xfffffffe, [[0x7, 0x1, 0x10001, 0x10, 0xd761, 0xd3, 0xc825, 0xfffff000], [0x5, 0xfffffffe, 0x6, 0x4, 0x6, 0xb9f1, 0x1, 0x4], [0x2, 0x5, 0x400, 0xfffffffc, 0x5, 0x9, 0x8, 0x79e]], [], [{0x1, 0x2, 0x0, 0x1, 0x1}, {0x80000000, 0x2, 0x1, 0x1, 0x1, 0x1}, {0x0, 0xfc, 0x1, 0x0, 0x1}, {0x7f, 0x3, 0x1, 0x1, 0x1, 0x1}, {0x4, 0x1, 0x1, 0x0, 0x1, 0x1}, {0x0, 0x8531, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x208001, 0x0, 0x1, 0x1}, {0xfffffe00, 0x9, 0x1, 0x1, 0x1}, {0x5363, 0xfffffffc, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x40, 0x400, 0x0, 0x1, 0x1}, {0x1, 0x80000000, 0x1}], [], 0x3}) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r3 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r3, r2) 00:47:40 executing program 3: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000007680)={0x0, 0x5f, &(0x7f0000000140)={&(0x7f00000075c0)={0x1c, r4, 0xb631c6b8429a7eb, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r4, 0x100, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x401}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x14) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, &(0x7f0000000140)={0x4, 0x1, @raw_data=[0x3, 0x3d5e226c, 0x9e, 0x4, 0x0, 0x5e0, 0x24000000, 0x10001, 0x1, 0x1, 0x4, 0x7fffffff, 0x9, 0xee, 0x800, 0xffffffff]}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) accept$inet6(r5, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000200)=0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r7, &(0x7f00000017c0), 0x199, 0x0) 00:47:40 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0xfffffffd, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x4e24, 0xfffffffd, @loopback}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r7 = socket$inet_sctp(0x2, 0x1, 0x84) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x10001, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r9, 0x10e, 0x5, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(r9, 0x8903, &(0x7f00000004c0)=0x0) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r12) r13 = getpid() sched_setattr(r13, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x38, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r15 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r16) r17 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="ffff2000", @ANYRESHEX=r18, @ANYBLOB=',\x00']) r19 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@gid={'gid', 0x3d, r20}}]}) getgroups(0x4, &(0x7f00000009c0)=[0xee00, r18, 0xffffffffffffffff, r20]) r22 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r23 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r23, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r24 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/context\x00', 0x2, 0x0) r25 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r25, 0x10e, 0x5, 0x0, &(0x7f0000000100)) socketpair(0x2c, 0x80000, 0x8, &(0x7f0000000a40)={0xffffffffffffffff}) r27 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r27, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r28 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r28, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r29 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/bsg\x00', 0x80, 0x0) r30 = syz_open_dev$ptys(0xc, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000000b40)={&(0x7f00000003c0)=@kern={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000940)=[{&(0x7f0000000500)=ANY=[@ANYBLOB="100000002f0000042dbd7000fedbdf251e21d9a5f4a5150fbd67fba62cd114e2bf4e6448b05cb1ea9db3a6cde265712a20b50ab3863401d3a7c5e1682503ca48e3f43cb4a5dbe2832098951f2602690b360184001df80a18c5d77df6dc3677463efe4ba42782a27ed114e883cbbacfde"], 0x10}, {&(0x7f0000001180)={0x1448, 0x10, 0x520, 0x70bd2b, 0x25dfdbfd, "", [@typed={0x8, 0x88, 0x0, 0x0, @fd=r2}, @nested={0x19d, 0x5f, 0x0, 0x1, [@typed={0x8, 0x29, 0x0, 0x0, @u32}, @typed={0x4, 0x1e}, @typed={0x8, 0x81, 0x0, 0x0, @ipv4=@multicast1}, @generic="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", @generic="b7c04279c74e92f2296f98ac1d68d964a4a3a9537d385d3d90831bef6361864f1bbbbdbf4f72e7de286cf56dda57ea99610cca9b834dd64591e62bb0caf26fb31627032b28ac97559f3101e5032c829e86804c58003734f12f947eca934f1eb566f7d17e41fd5bf76b3adb43526069fb3566ceb7d5f2bec1a8480c28a75cbd51f46ae908e0155844fd8d"]}, @generic="b15df2848896c33845bcc6812ce66166334cfbc95a5fc97f8eb72ab881bfa2467953ab15b61abb5a5b8dd2d365a3aa74ea12f384547d2ca975a419955b9d8560b785b74faa47c5e9fd4be230b1eca249ff72bad004b3365f01605ca76a261adcc9c84056b52512d6649eadc40972459c728ce2eea53db3b78abbd201bae38e3d34ef60feed95b5c9674d1894c2d3f70c0f1ad75447546108504a1ea2b14a1a0ef050c41938c8f008937ae9991af1d071c104e8370d6784bbe7ace42f933c9a433ce7c09804498692a954d4ce0cc03ca9993d791ba4168c7d96bbbe064905fa039259e4f6269ba64605ee106cfd5391", @generic="b10387dc03cd9357d99249d9", @typed={0x9b, 0x8d, 0x0, 0x0, @binary="8a8e91f3d72ea5bb142d36e380abaaebf7114e29e45d27f35d9c4baffe9f4fa3002fb65b3561a7efad7adf7c74f83d76c6deb03ec7d1b037e9c726e2a9e265ba52d5fceab32b2a195217cecbab9ce3bfe4e7150d10e6c6c699099834a63b89089c65b4f280000214eb84ecb455aa703915cabca803d61c1dd09fd32ce3c3c525bb94039218239bba9a9c6ede0951757fe05bc53d1e1644"}, @generic="0c6b61ce83008d63f8f537d7bd4acd71113606dd570608b956624289012a07af6ff5eac2b47d1c1f1bc751037f6087e7963cb0014100f137e524e04d4391f75401531d01b2aa2167cf5515be501934680e7acfb2fb5ceac4e8edf3d44aa734505d2194b4bf07a484b88da10739058dec61a709c88c7395205acc2b3c6085361bb49cd98076dbe17902138deb2e1b8dad5997bbdedb7208bb9e5cdd567c31b56f32bae5bed307579a8422a4a2d3d006f702276247890b7249ef1bdc77459c57626ed5287cab6841f3714df91294d3f2946fba18bfc61e36b223467b68979aa3cf1005cbc6e79d214bad4a0730c32327aa", @generic="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", @typed={0x8, 0x73, 0x0, 0x0, @pid=r10}]}, 0x1448}, {&(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="eef55d83bb40a019cf550fc21469eb277e061ee245a54675bb24a0f7017016e86fce7638da28aeabc5c083a99b44921e1e4ed67b69c7dbd1581bb0fe86acb2d0f6cfafe217ac83d35db285a7458cc1e5ab88e30ac135d875be9ed32b47e9c2a70af7c2e38fb73c850d911ddd194b341428d3d625e7edbd1001537f454d4dc2b7d127426570a6c792eec7409d730529e85762739ccb37546066b599f7c2670cc12460770bc182832970999f5ea2981448b2578c85ea0095b46bc8fee1b02f79bc694bf512273d89ccceecca9908003b000100010008009100", @ANYRES32=r12, @ANYBLOB="9bc6c600"/18], 0x258}, {&(0x7f0000000780)={0x114, 0x42, 0x4, 0x70bd2c, 0x25dfdbfb, "", [@typed={0x14, 0x13, 0x0, 0x0, @ipv6=@remote}, @generic="747a90c2cf57ab2f6c55d7e514790609837835a83bb6bbe716ad0bbd00b4d9ed5f035e97e63e621e77c7a58c5d2616d98f01bdd285532a10a770aa3801845258923161d602888dd096a19b6ed385387884123dae6f4c5a83972394d66de36af9edd7002b8f72576f94ed4ad4110ef6d7d001ee760396d85ce43725d0f36df45047788c", @nested={0x6c, 0x5d, 0x0, 0x1, [@typed={0xb, 0x4b, 0x0, 0x0, @str='GPL.[\\\x00'}, @typed={0xd, 0x7e, 0x0, 0x0, @str='security\x00'}, @generic="5861dfabbe9596a51fc86fc12c27a7b8fef2d449f35ea43d8029231aa416f287c881bb6f85eb0c905a12dba5c408fb1feee6c4b18abec0db6148af44", @typed={0x8, 0x8d, 0x0, 0x0, @pid=r13}, @typed={0x8, 0x49, 0x0, 0x0, @fd=r6}]}]}, 0x114}, {&(0x7f00000008c0)={0x58, 0x31, 0x8, 0x70bd29, 0x25dfdbfd, "", [@typed={0x47, 0x3, 0x0, 0x0, @binary="cd929695487e049133379642f7143595de631405e4cc5a35401b54e9bbbda7923f356c19a83d717b9444af2af73f9361a9ce4b532ac67166c8d3e6ef782e94d1ee76b7"}]}, 0x58}], 0x5, &(0x7f0000000ac0)=[@cred={{0x1c, 0x1, 0x2, {r14, r16, r21}}}, @rights={{0x18, 0x1, 0x1, [r22, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [r23, r24, r25, r26, r27, r1, r28, r29, r30]}}], 0x70, 0x4000}, 0x4004800) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001100)={r31}, &(0x7f0000001140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000280)={r31, 0x36, "ac6a82d2b5acd821e04d0478a474e9c2be3b387e029887626c7e3cf456672c29c8210efff7d4d24bdf54e0b4d427ae9a6873dd3c164e"}, &(0x7f0000000340)=0x3e) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r6, 0x84, 0x1b, &(0x7f0000000000)={r31}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000140)={r31, 0x3e, "59fffe1be196a32f0c8e7a042fca9ab662045510f0d7e28fc17823ce96cccf8710c611d70876110ae638e8194328b2be84b663323403ae7afd0673bbd885"}, &(0x7f00000001c0)=0x46) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000200)=ANY=[@ANYRES32=r32, @ANYBLOB="cc0000009dd830cd81b2551d7225ba91bcae26fb61eeb974c6d23f75cc485fa3fc130b597a8a5932a73237a27af5ff64e125a0789c78fa733a2e6a406e96213d4e57b2d42a2d7f469d6936af0cf2f4e2810c8da7be46de4fef1163dfbb837f537c8d3eb9486682ffdbf0d241d81a1ffdd43983c4643f2ac5fffb60f598b40e39a27d8f59f9911883430af0aa2f222ab739eca4180eecb9a72eb9b8d24e7343f77a9bb2a8947cae9c856911263b39766339d906dd70d6e1cc634c40847f81e8ea03c630982fad44c43818073e80d85a01"], &(0x7f0000000300)=0xd4) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:47:40 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="000083683d3400001c0012000c0001006272696467650000b53f43c0d990aaaddf0c000204cc314df13246821b4f4d2ed94c73492f6aa604ef5bb334b98d649fc83e3c6df34f4d447d7104e5e462c0a98a2d4c20893dc239d969c9f92f34a1bad1741415775af1a62abeec1d2c4317f33eeb2147da7c17c5d2928106c561a600"/138], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x6}}, 0x1c}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r8, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r8, 0x80845663, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r9 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r9, 0x10e, 0x5, 0x0, &(0x7f0000000100)) write$binfmt_misc(r9, &(0x7f0000000340)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRESHEX=0x0, @ANYRES16=r1]], 0x8) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 00:47:40 executing program 3: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r2, 0x10e, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000007680)={0x0, 0x5f, &(0x7f0000000140)={&(0x7f00000075c0)={0x1c, r4, 0xb631c6b8429a7eb, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r4, 0x100, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x401}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x14) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, &(0x7f0000000140)={0x4, 0x1, @raw_data=[0x3, 0x3d5e226c, 0x9e, 0x4, 0x0, 0x5e0, 0x24000000, 0x10001, 0x1, 0x1, 0x4, 0x7fffffff, 0x9, 0xee, 0x800, 0xffffffff]}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) accept$inet6(r5, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000200)=0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') [ 822.138918] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 822.156950] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 822.168877] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:47:40 executing program 5: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ashmem\x00', 0x88200, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0xfffffffffffffff8, 0x20000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r8, r9, &(0x7f0000000040)=0x1, 0xe0) r10 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r10, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001100)={r11}, &(0x7f0000001140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r9, 0x84, 0x6d, &(0x7f0000000480)=ANY=[@ANYRES32=r11, @ANYBLOB="36000000ac6a82d2b5acd821e04d0478a474e9c2be3b38cb9b3241ede0957e029887626c7e3cf456672829c8210efff7d4d24bdf5400000000ae9a6873dd3c164ec6b31a3789f4d90310faf1793d29c8122b5cda5d6f058b28e24a2056dc26f9cddb487fa48cea806fde07453918f223c911a27c4d285dc9e3a7975a5e9c171b9b4820cee68805837429ac98"], &(0x7f00000002c0)=0x3e) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r7, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=r11, @ANYBLOB="00000000496d13274023680ea16d69a151c75c4d58d9ce819634cf49a235f8f6a7aa3fb7901953864585b9b6e20a34e7cc9758b6a55b4ae9ea80158dd54abb8dd2f87d623ce40eb2df27eed61e709d9a97000000000000000000"], &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000380)={r11, 0x5, 0x2}, 0x8) sendmsg$NL80211_CMD_GET_INTERFACE(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000000)={0x14, r4, 0xb0343aabd1184b87}, 0x14}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="eb008c000826bd7000fddbdf25200000000c0499000900000000000000080001000400000008000100ffffffff0c0099000100ffffff"], 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r12 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r12, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) 00:47:40 executing program 0: fchdir(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x8) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0