0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x74, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1108.248034][ T9351] device wlan1 entered promiscuous mode [ 1108.275614][ T9349] device wlan1 left promiscuous mode [ 1108.338689][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:14:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000000)={0x2, 'veth1_to_batadv\x00', {0x3}, 0x9}) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x2000c880, &(0x7f0000000280)={0xa, 0x4e23, 0x1, @private1={0xfc, 0x1, [], 0x1}, 0x3}, 0x1c) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000180)={0x8, "5fc6202613bc9917ea42dfa46f061e3339713199bfc0a784f1a45a58beae51e1", 0x2, 0xe2, 0x1, 0x3000000, 0x4, 0x8}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cuse\x00', 0x2, 0x0) splice(r4, 0x0, r5, 0x0, 0x18, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r4, &(0x7f0000000340)={&(0x7f0000000200), 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB='#\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00032dbd700104000000000000c9bda6c318", @ANYRES32=r6, @ANYBLOB="0c0099000104000073038303000000000000000000000000ef088e4df7d932cd374583ef175e88332227ece9dd2ee4e6a5db9119739aa0dacc6ef6d00ff4dc4b6187ad61a9887593c186e04b8258cff7486c72ba8cc867203edd39a83f085feb132b1f8efd537e8e0a"], 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r7 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r7, 0x0, 0x43, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 16:14:44 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:14:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 16:14:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x3e8, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:14:45 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20912001}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x78, 0x0, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x2}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e23}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x400}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1000}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x15}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xf70}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x4}]}, 0x78}}, 0x48881) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 16:14:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7a, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:14:45 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:14:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, 0x0, 0x0, &(0x7f0000000180)}, 0x0) 16:14:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @remote, 0xfff}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, '\x00', "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:14:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x500, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1109.381786][ T9405] device wlan1 entered promiscuous mode [ 1109.574974][ T9414] device wlan1 left promiscuous mode 16:14:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, 0x0, 0x0, &(0x7f0000000180)}, 0x0) 16:14:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:14:45 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1109.997706][ T9415] device wlan1 entered promiscuous mode 16:14:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x5aa, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:14:46 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000180)={0x1, 0x2, 'client0\x00', 0xffffffff80000005, '\x00', "85908ddc65bf045b459ef2f5df26d48d6e96e22fa5ec00", 0x700000, 0x400000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 1110.182686][ T35] kauditd_printk_skb: 21 callbacks suppressed [ 1110.182703][ T35] audit: type=1800 audit(1608048886.023:2064): pid=9427 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=674 res=0 errno=0 16:14:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r4, &(0x7f0000000080)={0x18}, 0x75) ioctl$VIDIOC_TRY_EXT_CTRLS(r4, 0xc0205649, &(0x7f0000000140)={0xa20000, 0x0, 0xfff, r1, 0x0, &(0x7f0000000100)={0x9a0001, 0xfffffffa, [], @p_u32=&(0x7f0000000000)=0x81}}) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r5, &(0x7f0000000080)={0x18}, 0x75) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r7, @ANYBLOB="0303000000000100000008000000f93a7b9c05a95db9f76f1c487ac005ace5b96873c82c4b77fecf15"], 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r5, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYBLOB="4c10010ac0b45de1a92f937dc58cce54a43d6ebd1c69cdb901a3d73ec8ad2aec770f488e5b0000000000001b71f2e36971a705000000683caf73594b1a2b252101e5ad0d1036210a90457336ba32a6f5470f6760185c670da40400000000000000267d6ea4ebe4c64d3c3f0c7692337075840000000000005de1dd883c70442f535ff90d27d1cff7c98e821f065ce944b3bffb6a4a1db200001ca03bb9ffea37d04b00ee81250244cc9fea33c67c9543a2186a841017003e179ff04807ee50ed5ae3726f6c0816e29ddcdc13156e334e15ad52a22edead3a3ceb6c7dcda832d2f6c8b3cee4a5ff95dc73b46480ba7cc97df1a8aa9b4272b7b25f91bba1ad64428ba4ea3ef539e0886b108db05a7c9aa89c884a5b9c98aeb3019f0f0a13b01f40ac256fcfcad9148ba45683651f1e9920", @ANYRES16=r7, @ANYBLOB="20002bbd7000fddbdf250300000006001a004e220000060002000100000008000b0002000000050014000200000006001b004e20000006001c000500000008000a0003000000"], 0x4c}, 0x1, 0x0, 0x0, 0x804}, 0xc055) 16:14:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, 0x0, 0x0, &(0x7f0000000180)}, 0x0) 16:14:46 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:14:46 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1110.381224][ T9433] device wlan1 left promiscuous mode [ 1110.392288][ T35] audit: type=1800 audit(1608048886.093:2065): pid=9424 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=934 res=0 errno=0 [ 1110.394835][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1110.483476][ T35] audit: type=1800 audit(1608048886.123:2066): pid=9426 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=675 res=0 errno=0 [ 1110.566534][ T35] audit: type=1800 audit(1608048886.173:2067): pid=9424 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=935 res=0 errno=0 16:14:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x600, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1110.883523][ T35] audit: type=1800 audit(1608048886.713:2068): pid=9449 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=676 res=0 errno=0 16:14:46 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1110.949832][ T35] audit: type=1800 audit(1608048886.793:2069): pid=9449 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=677 res=0 errno=0 16:14:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340)}, 0x0) [ 1111.027839][ T35] audit: type=1800 audit(1608048886.823:2070): pid=9450 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=936 res=0 errno=0 [ 1111.187015][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:14:47 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1111.311532][ T9436] device wlan1 entered promiscuous mode [ 1111.341372][ T9457] device wlan1 left promiscuous mode 16:14:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340)}, 0x0) [ 1111.361474][ T35] audit: type=1800 audit(1608048887.013:2071): pid=9447 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=937 res=0 errno=0 16:14:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000100)=0x1e) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 1111.448614][ T35] audit: type=1800 audit(1608048887.293:2072): pid=9466 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=678 res=0 errno=0 [ 1111.593900][ T35] audit: type=1800 audit(1608048887.343:2073): pid=9466 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=679 res=0 errno=0 16:14:47 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1111.642256][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:14:47 executing program 1: socket$kcm(0x29, 0x2, 0x0) openat$qrtrtun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qrtr-tun\x00', 0x440100) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)={0x6c, 0x25, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0xed}, @ra, @calipso={0x7, 0x40, {0x3, 0xe, 0x81, 0x6, [0x1, 0x5, 0x5, 0xfffffffffffffff7, 0xffffffffffffff80, 0x8, 0x0]}}, @pad1, @ra={0x5, 0x2, 0x1}, @generic={0x5, 0x7f, "68d8dbd7140ecf1d944ae2f9ac07dc218908ab189d4668ddb98b5ad491d534374460b163598602bda6474dcb119ec7c63a9a261af3feb23e6224968643074596f0c52dd499b287e82913bec6614d14ac99c20ced0b0fdbf06e6be8d8bd30d2264fc3f6a4ebbff5a48b9c9f64ff9d1e03ad276fdd541a1c0c9b24e3097f5167"}, @hao={0xc9, 0x10, @ipv4={[], [], @multicast1}}, @calipso={0x7, 0x40, {0x1, 0xe, 0x1, 0x0, [0xb0c, 0x2, 0x9, 0xffffffff, 0xefe5, 0x3, 0xd82]}}]}, 0x138) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000200)='wla:x\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\x14(\x00\xd3\x93\t\x964\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\xba\xbe\xbd\xe2\xffh=\xe3\xd8\x13\x95\xe11\xc9\xb4\x14%\xcf\x9b\x1cP\xeb# \x0f3\a\x96\xfd\x1dS\xa2\x10U\xa8\xd2\xac<\x87\x15\xfc)\xbc\x1a\xd6*J\xee\x8f\xfb)\x9d\xa3\x8b\xd7\x14\x99hj\x81\xf7Q\x94\rb\x93TV\xb4\v3x\xd1\x9a\xc7\x151\xbc_\xbfu@\xff\xee\x86\x19\xe9\x83}\xf7\xf5\x13\xb3\xddA\x1a&\t\xbfC\xdb\xc4X}\xa8[h\x8f\x10S78\xccB\xd965\x947\x8a<~\xdf\xad\x10\xf0T\xc2\xe9\xf6\xf9\xd0\xa7\x1b\x88\x91\x17`\xa5\xd4B\xb8\x11\xc1\xf2z\x80\xd4\x95U\xdfFJ\x9b\xd8\x8d\x111\xdck\xfc\xfa\xabM\x9dO6\x82\xdf\x0f[\x83\x15\xac\xc2\x90\\\x88\xad\x97\x13\x90\xed\a\xf8a\xc3\x99\xccEl\xab\xebN[\x17Q\xfb<\xc0\xc9\xcd\xfa8\xc9\x97\x06\xa5|\xe1') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$vim2m_VIDIOC_STREAMON(0xffffffffffffffff, 0x40045612, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 16:14:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x700, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:14:47 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:14:47 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:14:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x74, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1112.630450][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1112.697404][ T9495] device wlan1 entered promiscuous mode 16:14:48 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:14:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 16:14:48 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x1}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={r1, @in={{0x2, 0x4e23, @loopback}}, 0x400, 0x9}, &(0x7f00000001c0)=0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') r3 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x8, 0x2) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000240)=0x1) 16:14:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r4, &(0x7f0000000080)={0x18}, 0x75) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:14:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x900, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:14:48 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1112.935291][ T9509] device wlan1 left promiscuous mode [ 1113.004324][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:14:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x74, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:14:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xa00, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:14:49 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:14:49 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:14:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xe, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:14:49 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:14:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xbb8, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:14:49 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1114.051657][ T9513] device wlan1 entered promiscuous mode [ 1114.080269][ T9517] device wlan1 left promiscuous mode 16:14:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:14:50 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:14:50 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af22, &(0x7f00000000c0)={0x2}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[], 0x94}, 0x1, 0x0, 0x0, 0x40}, 0x41) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f0000000200)={0x1, 0x0, [{0x80000000, 0x3f, 0x6, 0x0, 0x7, 0x7}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000003c0)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00I\xfd\x05\xa0\x894Q\xdd\xff\xeff8I\x00\xae\xe9\x1bQ\xa8\x85\xd4\xf4\'h\x10I\xa5bE}\xa1\xe9oG\xc4\xa0\xbf\x97\xf3\xe8\x8d%-\xaa\x9c\"\xc80.B\xed\xf9w\\\xf8\xd1\xeaYg\xb1\t\xcd\xb3/\x05\nN\xcb\x93\xab>\xa7\xe6\x17\xf7\xbe\xf1\xde\xabkC\xf7\xd5\xc0>_p\x857\x06UB\xac\x00\x9e0\xe9\x8a\xc62N\xf7\x9d\x8e{;\xb34\xc4ku\xaa\x82\xd7\xbe\x98\xa9\x03\x98]\xd7\x11o\xb8AQ\x13\x9d\xd3\x8d\xac\x10j\xb5\xe4\x81\xf3\x00\x00\x00\x00\x00\x00&\xd5\x83\xa1\x99\xfdY\xff\xf2\x94\xfd\xe2\x13\x12&\\\x8e\xca\xc4\xbf\x9c\x10\xe7H\x98\x94\xf5ac\x91\xcf\a\xe2 s\'A\xb4\xc1!\xff\xd3u\x8d\xc6\xa3\xb5\xf0\xddz\b\x9f\xd8\xbc;3\x91\xb4\x9b,\xd4\x14\xc6p\x1e\xef\x18\xcfu\x02\b\x03\xa9\xe7\xfb\x12{\xf1\xa4\v\xff0\xc3\xbe\xb4/H\xd7\xa2\xbe\x06o\x87\xda\x9c\x8d\xb6I\"\xcd\xb8B|\xc6\xc4!\xd8\x7f\xb72$\xb8\xcf\x90\xec3\xdc\xdd\'\xfd\tQ\x91\xde-\x88\x8culM\x17\x8f\xf4T\xff]%\x1d2\xdbn\xf2\xa1\xa9\xf0\xba%9R\x9c\"\xe3\xc3\x00\xc1Z\xaf\xb8c\xb6\xca\xa9\x10\xb3\x1fF\xde#\x06q$\xb0\xe9\xa5N~;0\\') 16:14:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000040)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) epoll_create1(0x80000) 16:14:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x4c, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:14:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xe00, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1114.847097][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1115.025056][ T9580] device wlan1 entered promiscuous mode [ 1115.229829][ T35] kauditd_printk_skb: 25 callbacks suppressed [ 1115.229855][ T35] audit: type=1800 audit(1608048890.933:2099): pid=9578 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=690 res=0 errno=0 16:14:51 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1115.316804][ T35] audit: type=1800 audit(1608048891.163:2100): pid=9571 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=691 res=0 errno=0 16:14:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:14:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xf00, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:14:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x4c, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:14:51 executing program 1: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 1115.666769][ T35] audit: type=1800 audit(1608048891.393:2101): pid=9594 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=950 res=0 errno=0 [ 1115.801550][ T35] audit: type=1800 audit(1608048891.643:2102): pid=9591 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=951 res=0 errno=0 16:14:51 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/connector\x00') ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xe2, 0x5c1d, 0x0, 0x5, 0x1b, 0x15, "59091195223f1c520533ee79af40a85195b412c6f25024f3f5e7c3802c0ae4a99d87a2d3313507c7bcd2711562e782507f176a12810b6a6aab7ff33b090eb016", "24ed91d23c7b73d953cb4e99c3b69ac5bfe72c97eb0b4421e42bd6ce8d814376cbeb629627ebc2563da117a356ac29ff171bc60e15efc59bb92bba90255065fb", "27b24bb028ae801ba241bffc550dab894bac870c80f308de2440e8c3f7616bc6", [0x5, 0x80]}) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x88, 0x67, &(0x7f0000000040)=r3, 0x4) sendmsg$kcm(r3, &(0x7f0000000480)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000340), 0x0, &(0x7f0000000180)}, 0x400c014) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000000240)={r3, 0xf5}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000280)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000009951e9a184e630f6f2000000000000000000"], &(0x7f0000000200)=0x24) 16:14:51 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1115.931309][ T35] audit: type=1800 audit(1608048891.773:2103): pid=9608 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=692 res=0 errno=0 16:14:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:14:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000080)={0x18}, 0x75) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000000)={0xfffffeff}, 0x4) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 1116.058352][ T9611] device wlan1 left promiscuous mode [ 1116.117146][ T35] audit: type=1800 audit(1608048891.963:2104): pid=9593 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=693 res=0 errno=0 16:14:52 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x66, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:14:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x1100, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1116.262442][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1116.272033][ T35] audit: type=1800 audit(1608048892.113:2105): pid=9621 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="SYSV00000000" dev="hugetlbfs" ino=167 res=0 errno=0 [ 1116.592146][ T35] audit: type=1800 audit(1608048892.293:2106): pid=9618 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=952 res=0 errno=0 16:14:52 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xa, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1116.858143][ T35] audit: type=1800 audit(1608048892.423:2107): pid=9618 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=953 res=0 errno=0 [ 1116.883521][ T9612] device wlan1 entered promiscuous mode [ 1116.919087][ T35] audit: type=1800 audit(1608048892.763:2108): pid=9631 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=694 res=0 errno=0 [ 1116.949846][ T9611] device wlan1 left promiscuous mode 16:14:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1117.023661][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:14:52 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:14:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x2000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:14:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) socket$inet_icmp_raw(0x2, 0x3, 0x1) mq_open(0xfffffffffffffffd, 0x40, 0xc1, &(0x7f0000000000)={0x9, 0x7, 0x800, 0x3}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 1117.468782][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:14:53 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1117.949554][ T9614] device wlan1 entered promiscuous mode 16:14:53 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x1000, 0x15d000) write$FUSE_BMAP(r2, &(0x7f0000000180)={0x18, 0xfffffffffffffffe, 0x0, {0x3f}}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f00000000c0)={0x4, {{0xa, 0x4e23, 0xe3e, @loopback, 0x10001}}}, 0x88) 16:14:53 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:14:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x3f00, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:14:53 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1118.354261][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:14:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1118.399005][ T9666] device wlan1 left promiscuous mode 16:14:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) splice(r2, 0x0, r3, 0x0, 0x18, 0x0) getsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000100), &(0x7f0000000140)=0x4) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x200000, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:14:54 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x74, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:14:54 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xf, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:14:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x4000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1118.792651][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:14:54 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/connector\x00') ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xe2, 0x5c1d, 0x0, 0x5, 0x1b, 0x15, "59091195223f1c520533ee79af40a85195b412c6f25024f3f5e7c3802c0ae4a99d87a2d3313507c7bcd2711562e782507f176a12810b6a6aab7ff33b090eb016", "24ed91d23c7b73d953cb4e99c3b69ac5bfe72c97eb0b4421e42bd6ce8d814376cbeb629627ebc2563da117a356ac29ff171bc60e15efc59bb92bba90255065fb", "27b24bb028ae801ba241bffc550dab894bac870c80f308de2440e8c3f7616bc6", [0x5, 0x80]}) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x88, 0x67, &(0x7f0000000040)=r3, 0x4) sendmsg$kcm(r3, &(0x7f0000000480)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000340), 0x0, &(0x7f0000000180)}, 0x400c014) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000000240)={r3, 0xf5}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000280)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000009951e9a184e630f6f2000000000000000000"], &(0x7f0000000200)=0x24) 16:14:54 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:14:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x10, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:14:55 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wla\xff\xff\xff\xff\x00\x00\x00\x00\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') read$FUSE(0xffffffffffffffff, &(0x7f00000025c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000004600)={0x28, 0x0, r1, {{0x80000000, 0x2, 0x1}}}, 0x28) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000002400)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000002580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000002540)={&(0x7f0000004700)={0xe4, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {{}, {@val={0x4a, 0x3, r3}, @void}}, [@NL80211_ATTR_FRAME_MATCH={0x24, 0x5b, "19175b07b61eeb85a4f5da2d03633ddcffdf8b62fe5e6c7c589405e03d5634fd"}, @NL80211_ATTR_FRAME_MATCH={0x8a, 0x5b, "900738cf7f5a3d434abd847f54f4deb86abb8421be8aced63c744c99d7b613751840079e92ae6cecfd62fd73c022ee0ddade0e46e12e9c7a9f3cdbd9d38f177b72acc083d808a7fb6d8e8590b24c857571a6fe02fd94767f92db1e4a1bc54b7c6c6536377dfdb6a19052feda22d4dd1202d4348c8422d0eb7a23413e097bf40b515b890e0d59"}, @NL80211_ATTR_FRAME_MATCH={0x0, 0x5b, "11dd822711ca9d522b67601b5731308228b22f7277a12940b773ddf51516aeb1125b6895ec4d5e4964d1c36636f61150a16d9e82ef46d27b48a0584d332f503417cf48965b732a9bec4b0f72b3f4638740631977d53289f7c9026be1f9e400d57d0054bf034b333fd47e459b2cbd9466c98599e125ec6196892c03d6f4ab4a7741de4409a3ef57f5f4bb57a2281032faffffff4a0980057d8dfb61a4c5aacd1a8f0755c3b16d7f9877a9f3c702b0799421b95d310dfeee7a28b1b7b0fd34d2212aa3d741e42f122eec9941b202d4df499d9aa2b56b78fbe452bdf939cce697f33d67faf1391f25a144326d7689"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x882}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x3}]}, 0xe4}, 0x1, 0x0, 0x0, 0x20048010}, 0x20004010) read$FUSE(0xffffffffffffffff, &(0x7f00000003c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x80) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x6, 0x22, 0x40, 0x3, 0x0, 0xffffffff, 0x12000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, @perf_config_ext={0x1, 0x78e}, 0x1, 0x5, 0x1, 0x8, 0x3, 0x3, 0x8}, r4, 0xd, r5, 0x3) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r7, &(0x7f0000000080)={0x18}, 0x75) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x6, @remote, 0x408000}, @in6={0xa, 0x4e23, 0x40, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x8}], 0x38) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r7, 0x80845663, &(0x7f0000004640)={0x0, @reserved}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r8, &(0x7f0000000080)={0x18}, 0x75) bind$qrtr(r8, &(0x7f00000002c0)={0x2a, 0xffffffff, 0x2}, 0xc) ioctl$KVM_PPC_GET_PVINFO(r5, 0x4080aea1, &(0x7f00000001c0)=""/145) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f0000000180)=0x2) 16:14:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x4800, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:14:55 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1119.584045][ T9695] device wlan1 left promiscuous mode [ 1119.585941][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:14:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x11, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1120.186054][ T9698] device wlan1 entered promiscuous mode [ 1120.203842][ T9711] device wlan1 entered promiscuous mode 16:14:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x4c00, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:14:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x80001, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x20000, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @mcast1}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100)=0xff, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 1120.298965][ T35] kauditd_printk_skb: 20 callbacks suppressed [ 1120.298981][ T35] audit: type=1800 audit(1608048896.143:2129): pid=9720 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=704 res=0 errno=0 16:14:56 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/connector\x00') ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xe2, 0x5c1d, 0x0, 0x5, 0x1b, 0x15, "59091195223f1c520533ee79af40a85195b412c6f25024f3f5e7c3802c0ae4a99d87a2d3313507c7bcd2711562e782507f176a12810b6a6aab7ff33b090eb016", "24ed91d23c7b73d953cb4e99c3b69ac5bfe72c97eb0b4421e42bd6ce8d814376cbeb629627ebc2563da117a356ac29ff171bc60e15efc59bb92bba90255065fb", "27b24bb028ae801ba241bffc550dab894bac870c80f308de2440e8c3f7616bc6", [0x5, 0x80]}) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x88, 0x67, &(0x7f0000000040)=r3, 0x4) sendmsg$kcm(r3, &(0x7f0000000480)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000340), 0x0, &(0x7f0000000180)}, 0x400c014) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000000240)={r3, 0xf5}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000280)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000009951e9a184e630f6f2000000000000000000"], &(0x7f0000000200)=0x24) 16:14:56 executing program 1: set_mempolicy(0x3, &(0x7f0000000000), 0x105) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 1120.480134][ T35] audit: type=1800 audit(1608048896.173:2130): pid=9721 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=962 res=0 errno=0 [ 1120.581245][ T35] audit: type=1800 audit(1608048896.423:2131): pid=9719 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=963 res=0 errno=0 [ 1120.720798][ T35] audit: type=1800 audit(1608048896.473:2132): pid=9718 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=705 res=0 errno=0 16:14:56 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:14:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0xedc, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:14:56 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x48, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:14:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x6600, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1120.937461][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1121.052655][ T35] audit: type=1800 audit(1608048896.893:2133): pid=9744 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=706 res=0 errno=0 [ 1121.159172][ T9736] device wlan1 left promiscuous mode [ 1121.225523][ T35] audit: type=1800 audit(1608048897.073:2134): pid=9739 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=707 res=0 errno=0 [ 1121.360364][ T35] audit: type=1800 audit(1608048897.103:2135): pid=9750 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=964 res=0 errno=0 16:14:57 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:14:57 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4c, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:14:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x6800, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1121.742969][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1121.743584][ T35] audit: type=1800 audit(1608048897.563:2136): pid=9758 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=708 res=0 errno=0 [ 1121.901680][ T35] audit: type=1800 audit(1608048897.603:2137): pid=9757 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=965 res=0 errno=0 16:14:57 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x68, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1121.996588][ T35] audit: type=1800 audit(1608048897.683:2138): pid=9757 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=966 res=0 errno=0 [ 1122.163346][ T9740] device wlan1 left promiscuous mode 16:14:58 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/connector\x00') ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xe2, 0x5c1d, 0x0, 0x5, 0x1b, 0x15, "59091195223f1c520533ee79af40a85195b412c6f25024f3f5e7c3802c0ae4a99d87a2d3313507c7bcd2711562e782507f176a12810b6a6aab7ff33b090eb016", "24ed91d23c7b73d953cb4e99c3b69ac5bfe72c97eb0b4421e42bd6ce8d814376cbeb629627ebc2563da117a356ac29ff171bc60e15efc59bb92bba90255065fb", "27b24bb028ae801ba241bffc550dab894bac870c80f308de2440e8c3f7616bc6", [0x5, 0x80]}) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x88, 0x67, &(0x7f0000000040)=r3, 0x4) sendmsg$kcm(r3, &(0x7f0000000480)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000340), 0x0, &(0x7f0000000180)}, 0x400c014) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000000240)={r3, 0xf5}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000280)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000009951e9a184e630f6f2000000000000000000"], &(0x7f0000000200)=0x24) 16:14:58 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:14:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x6c00, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1122.564330][ T9743] device wlan1 entered promiscuous mode [ 1122.572113][ T9776] device wlan1 entered promiscuous mode 16:14:58 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x28e042, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4400, 0x15b) write$snapshot(r2, &(0x7f0000000100)="44c162fd81c59421897f", 0xa) write$P9_RSTAT(r1, &(0x7f0000000200)={0x133, 0x7d, 0x1, {0x0, 0x12c, 0x80, 0x695, {0x20, 0x3}, 0x32800000, 0x91, 0x80, 0x7, 0x69, 'wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2', 0x73, '}*\xc1S<\xc3\xdf\x06\x00\x91{T`\xcd\x85U\xa5p \xc8+A\xc8\xcb\x82\xa3\xb1>\xb7\x13\xd5\v\xeb\xe2\x99\xf6\x00\xc4D\xec_\xb8\xb3*}\xf7 @\xa0f\xada\xfd/Tg\xa9\xff\xb8\x04eDS\x81\x87cG\x061(\'W\x8f?j\x15\xd6\x7fZ\xa1\xef\x80\xd3\xd3\x82=-OM\xa1\xae#\x1e\xe5\xfcr\xc9{\x98\x1fJ\x9fZ\xc9-\xe26\xfa\x00\x00\x00Hm\xedj', 0x8, './\xc6\'%$-[', 0x15, '\xd9:(\xc6\x96\xf4\x00\xc8D\xceq\xeaihO2\x02<\xb7\xe3d'}}, 0x133) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 16:14:58 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:14:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0xb27e) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:14:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6c, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:14:58 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:14:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x7400, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1122.928413][ T9786] device wlan1 left promiscuous mode 16:14:59 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x74, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:14:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x7a00, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:14:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x6600, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:14:59 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1124.079876][ T9791] device wlan1 entered promiscuous mode [ 1124.095340][ T9805] device wlan1 left promiscuous mode 16:15:00 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7a, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x80fe, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:00 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000080)={0x18}, 0x75) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r2, 0x80605414, &(0x7f00000000c0)) 16:15:00 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getrandom(&(0x7f0000000100)=""/217, 0xd9, 0x2) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:15:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1125.078417][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1125.171275][ T9843] device wlan1 entered promiscuous mode 16:15:01 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xff, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1125.309723][ T9843] device wlan1 left promiscuous mode 16:15:01 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1125.394607][ T35] kauditd_printk_skb: 18 callbacks suppressed [ 1125.394623][ T35] audit: type=1800 audit(1608048901.243:2157): pid=9849 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="SYSV00000000" dev="hugetlbfs" ino=173 res=0 errno=0 16:15:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xaa05, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:01 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') ioctl$USBDEVFS_CONNECTINFO(0xffffffffffffffff, 0x40085511, &(0x7f0000000000)) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 1125.872052][ T35] audit: type=1800 audit(1608048901.713:2158): pid=9861 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=718 res=0 errno=0 [ 1125.997027][ T35] audit: type=1800 audit(1608048901.773:2159): pid=9861 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=719 res=0 errno=0 16:15:01 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:02 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:02 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x6], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1126.124226][ T9870] device wlan1 entered promiscuous mode [ 1126.127953][ T35] audit: type=1800 audit(1608048901.773:2160): pid=9863 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=975 res=0 errno=0 16:15:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x8, 0x8001) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000140)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) sync_file_range(r1, 0x40, 0x1ff, 0x4) [ 1126.202631][ T9870] device wlan1 left promiscuous mode [ 1126.219410][ T35] audit: type=1800 audit(1608048901.823:2161): pid=9860 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=976 res=0 errno=0 16:15:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xb80b, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1126.370194][ T35] audit: type=1800 audit(1608048902.183:2162): pid=9880 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=720 res=0 errno=0 [ 1126.429165][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:15:02 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1126.482012][ T35] audit: type=1800 audit(1608048902.213:2163): pid=9880 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=721 res=0 errno=0 [ 1126.605124][ T35] audit: type=1800 audit(1608048902.243:2164): pid=9882 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=977 res=0 errno=0 16:15:02 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xf], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:02 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x6], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1126.783621][ T35] audit: type=1800 audit(1608048902.263:2165): pid=9878 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=978 res=0 errno=0 16:15:02 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1126.939418][ T35] audit: type=1800 audit(1608048902.273:2166): pid=9883 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="SYSV00000000" dev="hugetlbfs" ino=174 res=0 errno=0 [ 1126.949135][ T9873] device wlan1 entered promiscuous mode 16:15:02 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x21], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xe803, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1127.231248][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:15:03 executing program 1: socket$kcm(0x29, 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 16:15:03 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:03 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e32, 0x0, @empty, 0x9}, 0x1c) listen(r1, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000012c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, r2, 0x2, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x9}}}}, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x106}]}, 0x28}, 0x1, 0x0, 0x0, 0x20008011}, 0x4004000) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000001800)='/dev/nvme-fabrics\x00', 0x4c500, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001940)={&(0x7f0000000100)={0xe0, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1000}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x100}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xff}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x8800}, 0xc0c0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000002f00)={'wg1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@bridge_newneigh={0x1c, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r4}}, 0x1c}}, 0x0) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000014c0)={&(0x7f0000001480)={0x34, 0x0, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@GTPA_LINK={0x8, 0x1, r4}, @GTPA_FLOW={0x6, 0x6, 0x1}, @GTPA_O_TEI={0x8, 0x9, 0x3}, @GTPA_PEER_ADDRESS={0x8, 0x4, @local}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x2004014) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "f38a9bbf9af8f6ac9dc695ea831cd262", "ccb3014c", "5500ffffffff0640"}, 0x28) fgetxattr(r5, &(0x7f0000000000)=@random={'user.', '..#^^@^-\x00'}, &(0x7f00000002c0)=""/4096, 0x1000) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000200)={0x7, 0x3ff, 0x3, 0x8, 0x5, "de03ad7ea8e8c08790802aba49cf8c28234089", 0x3, 0x9}) 16:15:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2b], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xf401, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1127.767063][ T9915] device wlan1 left promiscuous mode 16:15:03 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socket$qrtr(0x2a, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000300)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5\x13\xc3R\xec\xc5\x93cy\xaa\x9a\x13\xff\xf4\xdeW\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\x81\x13\xed\xe3\x83\x8eb\x86C\xb8\xa2\x02\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\x11\x95\x11\x02Q\xcewT%\x8b\xbfP\xacr\x95\xdcS\x8ahC\xf8E\xd6\xea\x16\xec\x8c\xe7\x11\r\x12\x98\xb9\xeb\xbc\xa3\x05Ikv~\xc8,\x15L9GsJW\xcc\xed\xc4LJ8\xeb\xd0\xf9\x8e\x1f\x1d\xd9\x8e@\xa6\xe8G\xcc\xd2\\k\xad?tE\xbfe\xb7w6\x8b\x83\xfd\x9e\x93K\x9a') socket$kcm(0x29, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)={0x44, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x57, 0x53}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x12}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x1e}]}, 0x44}, 0x1, 0x0, 0x0, 0x10044800}, 0x4024) r1 = syz_io_uring_complete(0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000004c0)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL>\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2\xb3UX\x019\x027fN>\xe5\xf2\xb7\xd2\xc7}T\xd3\xc0)\xf0\x1b\xb5l\xce\x18H\xbd\xc1\n\x9d99\xe7\x93\xb0\x84\x1e\xebQ\x96\x06}\x8d\x9e\xa8y\xc6\xbc-\xa4}\xee+\xa6807\x9f\x1dr6\xb6\xa9\xabH h\x19K\x95\x160\xe2Y\xcaP<\x8b\xf7\xef\"<\x7fY;\x86\x03c\xd7\x12\x8c+L\xc9\x81\xe4\x1a\x8a#\x15\x94\xc0\xb6i\xca\x9f\xcbc7\x85\x98\xaaQ\xdf\v\x9e\xf0\xaf\x17E(\x9c\x1b\x8c\xddT\f\xac\xf0\x8b&\x8d]\x15\xde \xfb,Ye\n:\xb1fc\x1d\x18\xe7\xfe\xa0\x8bX\xf6\xe7\xe4\xf25\xe5+`\xf8\xacB{\xb8J\x04q4\x86z\n\'Y\xfe\x7f\xec\x17~|\x81\xd8b\xabf\xeb&\xc4\xd1B\x9a\x8f\x85Dz%\x8c\xb1\xc8\x7fhX\\$&\xe5:+1\x1f8\xfcc\xf4\x16\xd2|') ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e22, 0x9, @empty, 0x1}}, 0x6, 0x800}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x201, 0x0, 0x5, r2}, &(0x7f00000001c0)=0x10) 16:15:04 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:04 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2c], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:04 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socket$qrtr(0x2a, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000300)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5\x13\xc3R\xec\xc5\x93cy\xaa\x9a\x13\xff\xf4\xdeW\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\x81\x13\xed\xe3\x83\x8eb\x86C\xb8\xa2\x02\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\x11\x95\x11\x02Q\xcewT%\x8b\xbfP\xacr\x95\xdcS\x8ahC\xf8E\xd6\xea\x16\xec\x8c\xe7\x11\r\x12\x98\xb9\xeb\xbc\xa3\x05Ikv~\xc8,\x15L9GsJW\xcc\xed\xc4LJ8\xeb\xd0\xf9\x8e\x1f\x1d\xd9\x8e@\xa6\xe8G\xcc\xd2\\k\xad?tE\xbfe\xb7w6\x8b\x83\xfd\x9e\x93K\x9a') socket$kcm(0x29, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)={0x44, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x57, 0x53}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x12}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x1e}]}, 0x44}, 0x1, 0x0, 0x0, 0x10044800}, 0x4024) r1 = syz_io_uring_complete(0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000004c0)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL>\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2\xb3UX\x019\x027fN>\xe5\xf2\xb7\xd2\xc7}T\xd3\xc0)\xf0\x1b\xb5l\xce\x18H\xbd\xc1\n\x9d99\xe7\x93\xb0\x84\x1e\xebQ\x96\x06}\x8d\x9e\xa8y\xc6\xbc-\xa4}\xee+\xa6807\x9f\x1dr6\xb6\xa9\xabH h\x19K\x95\x160\xe2Y\xcaP<\x8b\xf7\xef\"<\x7fY;\x86\x03c\xd7\x12\x8c+L\xc9\x81\xe4\x1a\x8a#\x15\x94\xc0\xb6i\xca\x9f\xcbc7\x85\x98\xaaQ\xdf\v\x9e\xf0\xaf\x17E(\x9c\x1b\x8c\xddT\f\xac\xf0\x8b&\x8d]\x15\xde \xfb,Ye\n:\xb1fc\x1d\x18\xe7\xfe\xa0\x8bX\xf6\xe7\xe4\xf25\xe5+`\xf8\xacB{\xb8J\x04q4\x86z\n\'Y\xfe\x7f\xec\x17~|\x81\xd8b\xabf\xeb&\xc4\xd1B\x9a\x8f\x85Dz%\x8c\xb1\xc8\x7fhX\\$&\xe5:+1\x1f8\xfcc\xf4\x16\xd2|') ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e22, 0x9, @empty, 0x1}}, 0x6, 0x800}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x201, 0x0, 0x5, r2}, &(0x7f00000001c0)=0x10) 16:15:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xfe80, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1128.533964][ T9920] device wlan1 entered promiscuous mode 16:15:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400600) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 1128.768308][ T9944] device wlan1 left promiscuous mode [ 1128.884293][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1129.097265][ T9946] device wlan1 entered promiscuous mode [ 1129.105808][ T9952] device wlan1 left promiscuous mode 16:15:05 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x7, 0x0) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x3, 0xffffffffffffffa3, 0x1, 0x80, 0x80, 0x3f, 0x0, 0x5, 0x20, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6d6, 0x1, @perf_bp={&(0x7f0000000000), 0x38a24fd63ba0b8c8}, 0x400, 0x7, 0xab2, 0x3, 0xffffffff, 0x96, 0x7}, r2, 0x7, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 16:15:05 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2f], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x34000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x100000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x33], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:05 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1129.654215][ T9977] device wlan1 left promiscuous mode [ 1129.680014][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:15:05 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socket$qrtr(0x2a, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000300)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5\x13\xc3R\xec\xc5\x93cy\xaa\x9a\x13\xff\xf4\xdeW\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\x81\x13\xed\xe3\x83\x8eb\x86C\xb8\xa2\x02\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\x11\x95\x11\x02Q\xcewT%\x8b\xbfP\xacr\x95\xdcS\x8ahC\xf8E\xd6\xea\x16\xec\x8c\xe7\x11\r\x12\x98\xb9\xeb\xbc\xa3\x05Ikv~\xc8,\x15L9GsJW\xcc\xed\xc4LJ8\xeb\xd0\xf9\x8e\x1f\x1d\xd9\x8e@\xa6\xe8G\xcc\xd2\\k\xad?tE\xbfe\xb7w6\x8b\x83\xfd\x9e\x93K\x9a') socket$kcm(0x29, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)={0x44, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x57, 0x53}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x12}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x1e}]}, 0x44}, 0x1, 0x0, 0x0, 0x10044800}, 0x4024) r1 = syz_io_uring_complete(0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000004c0)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL>\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2\xb3UX\x019\x027fN>\xe5\xf2\xb7\xd2\xc7}T\xd3\xc0)\xf0\x1b\xb5l\xce\x18H\xbd\xc1\n\x9d99\xe7\x93\xb0\x84\x1e\xebQ\x96\x06}\x8d\x9e\xa8y\xc6\xbc-\xa4}\xee+\xa6807\x9f\x1dr6\xb6\xa9\xabH h\x19K\x95\x160\xe2Y\xcaP<\x8b\xf7\xef\"<\x7fY;\x86\x03c\xd7\x12\x8c+L\xc9\x81\xe4\x1a\x8a#\x15\x94\xc0\xb6i\xca\x9f\xcbc7\x85\x98\xaaQ\xdf\v\x9e\xf0\xaf\x17E(\x9c\x1b\x8c\xddT\f\xac\xf0\x8b&\x8d]\x15\xde \xfb,Ye\n:\xb1fc\x1d\x18\xe7\xfe\xa0\x8bX\xf6\xe7\xe4\xf25\xe5+`\xf8\xacB{\xb8J\x04q4\x86z\n\'Y\xfe\x7f\xec\x17~|\x81\xd8b\xabf\xeb&\xc4\xd1B\x9a\x8f\x85Dz%\x8c\xb1\xc8\x7fhX\\$&\xe5:+1\x1f8\xfcc\xf4\x16\xd2|') ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e22, 0x9, @empty, 0x1}}, 0x6, 0x800}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x201, 0x0, 0x5, r2}, &(0x7f00000001c0)=0x10) 16:15:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3a], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x400300, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:06 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1130.543715][ T35] kauditd_printk_skb: 25 callbacks suppressed [ 1130.543731][ T35] audit: type=1800 audit(1608048906.393:2192): pid=10002 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=991 res=0 errno=0 16:15:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e21, 0xa7c, @dev={0xfe, 0x80, [], 0x3b}, 0x7}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x8800, 0x0) 16:15:06 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) splice(r2, 0x0, r3, 0x0, 0x18, 0x0) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 16:15:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xfe80, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:06 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3b], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1130.746182][ T35] audit: type=1800 audit(1608048906.443:2193): pid=10010 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=734 res=0 errno=0 [ 1130.778552][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:15:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xf0ff7f, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1130.862519][T10017] device wlan1 entered promiscuous mode [ 1130.891189][ T35] audit: type=1800 audit(1608048906.533:2194): pid=9998 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=992 res=0 errno=0 [ 1131.220042][ T35] audit: type=1800 audit(1608048906.533:2195): pid=10004 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=735 res=0 errno=0 16:15:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xfe80, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1131.268381][T10017] device wlan1 left promiscuous mode [ 1131.489677][ T35] audit: type=1800 audit(1608048907.013:2196): pid=10027 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=736 res=0 errno=0 16:15:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x1000000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1131.563362][ T35] audit: type=1800 audit(1608048907.253:2197): pid=10022 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=737 res=0 errno=0 [ 1131.567208][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:15:07 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1131.592549][ T35] audit: type=1800 audit(1608048907.323:2198): pid=10031 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=993 res=0 errno=0 16:15:07 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3c], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1131.918555][ T35] audit: type=1800 audit(1608048907.433:2199): pid=10023 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=994 res=0 errno=0 16:15:07 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x68, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x2000000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1132.035892][ T35] audit: type=1800 audit(1608048907.703:2200): pid=10047 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=738 res=0 errno=0 [ 1132.133464][ T35] audit: type=1800 audit(1608048907.763:2201): pid=10047 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=739 res=0 errno=0 16:15:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$vim2m_VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000100)={0x1000800, 0x2, 0x4, 0x0, 0x80000001, {0x77359400}, {0x4, 0x2, 0x9b, 0x7a, 0x0, 0x89, "1e889cd2"}, 0x8, 0x3, @userptr=0x8, 0x0, 0x0, r2}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r4, 0x400445a0, &(0x7f00000001c0)=0x606a) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:15:08 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000100)=@phonet, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000000200)=""/244, 0xf4}], 0x2, &(0x7f00000003c0)=""/53, 0x35}, 0x22) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) r2 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) r3 = signalfd(r0, &(0x7f0000000c80)={[0x7]}, 0x8) mq_notify(r3, &(0x7f0000000cc0)={0x0, 0x27}) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') r4 = socket(0x10, 0x80000, 0x80000000) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x2f, 0x2, 0x1, 0x8, 0x2, @dev={0xfe, 0x80, [], 0xc}, @local, 0x7, 0x7800, 0x5, 0xffff7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000005c0)={@dev={0xfe, 0x80, [], 0x22}, 0x63, r5}) 16:15:08 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x41], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:08 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x88, 0x67, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)={0x0, @aes128, 0x0, @desc4}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 16:15:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x3000000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:08 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1132.594292][T10069] device wlan1 entered promiscuous mode [ 1132.671812][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:15:08 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0xb, 0x14, 0x8, 0x8, 0x2, 0x2, 0x7, 0xb, 0x2, 0xb, 0x3, 0x14, 0x8], 0x6}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x20c200a2, r5}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) r9 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) getpeername$packet(r11, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r9, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0xb, 0x14, 0x8, 0x8, 0x2, 0x2, 0x7, 0xb, 0x4, 0xb, 0x3, 0x8, 0x8], 0x6}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x20c200a2, r12}) connect$inet6(r9, &(0x7f0000000180)={0xa, 0x4e20, 0x8, @private2, 0x80000000}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000200), 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="70000000a486bf19000000000000000000df25802014b983540f6592cdb3000600150000007bce08", @ANYRESHEX=0x0, @ANYBLOB="08000300", @ANYRES16, @ANYRESHEX=r9, @ANYRES32=r7, @ANYBLOB="00b9fcde", @ANYRES32=r5, @ANYRES32, @ANYRES64, @ANYBLOB="08000b00290300040038bec50a4c6c2e3bd47642c6e8851eb96263f3e4c76195c47910ec10b8d2ab1b66c3129b729576c16eb0425fb5c0206bc9f6330ab8c07a9d7cfe74c34ac49548dd31d9cea7c777b8403d2bdd3ea8ed93184262e1f367c3f1a37ce772a08a9d6739e88ffb23f6e172db876d4399d45222b24129000000", @ANYRES64=r8, @ANYBLOB="9fcbe3d2472d5f24171b60e68b1a059400692062b342705613b82d3dc19dc0f5ba667f3d337cd74797b63ca94cb030129d7a13ab74803721e77a436496037fca78b1719ff1d397ffdf1d04ba829de2d3c0435d14c69c00"], 0x70}}, 0x20000001) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0xee00, r8}, 0xc) fchown(r1, 0x0, r8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 1132.850172][T10082] device wlan1 left promiscuous mode [ 1133.062459][T10574] usb 3-1: new high-speed USB device number 30 using dummy_hcd 16:15:08 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x88], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x4000000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:09 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x74, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1133.489593][T10089] device wlan1 entered promiscuous mode [ 1133.510710][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1133.563407][T10574] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1133.624064][T10082] device wlan1 left promiscuous mode [ 1133.644994][T10574] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 16:15:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @private0}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) splice(r4, 0x0, r5, 0x0, 0x18, 0x0) ioctl$VIDIOC_DQBUF(r4, 0xc0585611, &(0x7f0000000100)={0x8, 0x7, 0x4, 0x0, 0x9, {0x77359400}, {0x0, 0x8, 0x0, 0x81, 0x81, 0x30, "8ae59212"}, 0x81, 0x2, @offset=0x8, 0x3, 0x0, r3}) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) ioctl$IMCLEAR_L2(r3, 0x80044946, &(0x7f0000000000)=0x4) r6 = dup2(r2, r0) getsockname$inet6(r6, &(0x7f00000001c0), &(0x7f0000000200)=0x1c) 16:15:09 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1133.925084][T10574] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 [ 1133.934317][T10574] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1133.944511][T10574] usb 3-1: config 0 descriptor?? 16:15:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x5000000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1134.545239][T10574] saitek 0003:06A3:0621.0006: item fetching failed at offset 0/1 [ 1134.574059][T10574] saitek 0003:06A3:0621.0006: parse failed [ 1134.580043][T10574] saitek: probe of 0003:06A3:0621.0006 failed with error -22 [ 1134.768108][T10074] device wlan1 entered promiscuous mode 16:15:11 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000100)=@phonet, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000000200)=""/244, 0xf4}], 0x2, &(0x7f00000003c0)=""/53, 0x35}, 0x22) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) r2 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) r3 = signalfd(r0, &(0x7f0000000c80)={[0x7]}, 0x8) mq_notify(r3, &(0x7f0000000cc0)={0x0, 0x27}) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') r4 = socket(0x10, 0x80000, 0x80000000) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x2f, 0x2, 0x1, 0x8, 0x2, @dev={0xfe, 0x80, [], 0xc}, @local, 0x7, 0x7800, 0x5, 0xffff7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000005c0)={@dev={0xfe, 0x80, [], 0x22}, 0x63, r5}) 16:15:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x6000000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:11 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f00000003c0)='projid_map\x00') sendmsg$NL80211_CMD_TRIGGER_SCAN(r4, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, 0x0, 0x100, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_IE={0xd, 0x2a, [@ssid={0x0, 0x7, @random="94ab01b4b2d4a1"}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000800}, 0x40010) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r4, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3f0000ff6dc77df801a3f046", @ANYRES16=0x0, @ANYBLOB="040025bd7000fcdbdf25040000000800030004000000"], 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x20004084) fsetxattr$security_evm(r4, &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@v2={0x0, 0x0, 0x6, 0x1, 0x73, "06643349b8c479a9b0ba3cfe1fdccfeeb6a0b44d8cd5999e9f87ed7ab157d79c717a589c0ca016a02044f497d1061a40fc80c82ef949253b13778d4646dd0378c8530fa5789d3ac16caaf8ae430977a420fafe05870b0abfd2d86cc9ba256889b6f1c454e23a545b481b44d6dfe7dacd46b195"}, 0x7c, 0x3) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000740)='nl80211\x00') sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r4, &(0x7f0000000940)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000780)={0x15c, r5, 0x8, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x80000000, 0x2f}}}}, [@NL80211_ATTR_REKEY_DATA={0x10, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "13e62b38b1e5072a"}]}, @NL80211_ATTR_REKEY_DATA={0x24, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xffffff7e}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "9779606fef33ff41"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e4d1ee234840f2e9"}]}, @NL80211_ATTR_REKEY_DATA={0x54, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="42f5c228d76db13cfcc14893d5114056a2f959d95c057f6255ccfbbd9fe1e647"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "c2cf8fbdc3254e0e"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "e13e83132a3f5d7f"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="28217c93346432eaf470a2a66833b989"}]}, @NL80211_ATTR_REKEY_DATA={0xac, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="f86f7b83f71d273daceacd7bcca0be56"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="0fde6579c9870b7c52993a3356d65771"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="2497b4aa6ec660fb05d7d4755669e7ffb24e4a82fc6d21c2"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="790d2ee64867fd921a1ebc2a805a0b8e9e8e0cf98933442018bc52ddcdc491e3"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="b0358e72c0ffaa37c7ccf705b6d2c1a6e674ac9271538a6cc54f00efa4cc5db9"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="e58681d1e1cb98ff09d71ab15b7a69dd3076e9c8f50da9cf"}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x8000}, 0x42) sendmsg$NL80211_CMD_LEAVE_IBSS(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r5, 0x10, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x9e4c, 0x3e}}}}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) 16:15:11 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="dd0000004000000059bbf4197218861690cda44782981fdeac7d6614f020869022509bb327845790cf3c2029fadaacc018479dfe315d93fdeb7f4909f0366bd76d6bead9f4854a4bea1bc23747ce6147b55ffdafc415f4a2c19d93545219d1588a060448b47fd9ba3ca7430327b0ef880b8f49b403f4c1d02eda3318561a73d017d8d2a41e9cbce34719bc44f34766eea919b9652cd589ede389b2d952f947a342bc659f20b2387b20d4509af335e0b33e9cbfac5e183b66e556755df892ed37c84f494ca2e75ec70b60237fae59f2f1f1"], &(0x7f00000001c0), 0x1400) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000080)={0x18}, 0x75) ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) 16:15:11 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11, 0x2], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1135.830817][T22394] usb 3-1: USB disconnect, device number 30 [ 1135.916847][T10141] device wlan1 entered promiscuous mode [ 1135.930586][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1135.978488][T10141] device wlan1 left promiscuous mode [ 1136.063549][ T35] kauditd_printk_skb: 13 callbacks suppressed [ 1136.063567][ T35] audit: type=1800 audit(1608048911.843:2215): pid=10148 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=745 res=0 errno=0 16:15:12 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1136.215729][ T35] audit: type=1800 audit(1608048911.863:2216): pid=10148 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=746 res=0 errno=0 [ 1136.269832][ T35] audit: type=1800 audit(1608048912.103:2217): pid=10145 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=1003 res=0 errno=0 [ 1136.362943][ T35] audit: type=1800 audit(1608048912.193:2218): pid=10145 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=1004 res=0 errno=0 16:15:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11, 0x3], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x7000000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:12 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1136.520096][ T35] audit: type=1800 audit(1608048912.233:2219): pid=10160 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=747 res=0 errno=0 [ 1136.770149][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1136.785237][ T35] audit: type=1800 audit(1608048912.303:2220): pid=10160 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=748 res=0 errno=0 [ 1136.843559][ T9821] usb 3-1: new high-speed USB device number 31 using dummy_hcd [ 1136.878482][ T35] audit: type=1800 audit(1608048912.633:2221): pid=10170 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=1005 res=0 errno=0 [ 1136.935210][T10147] device wlan1 entered promiscuous mode [ 1137.031556][T10157] device wlan1 left promiscuous mode 16:15:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11, 0x4], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1137.057873][ T35] audit: type=1800 audit(1608048912.853:2222): pid=10166 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=1006 res=0 errno=0 [ 1137.088190][ T35] audit: type=1800 audit(1608048912.933:2223): pid=10175 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=749 res=0 errno=0 16:15:13 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000000c0)='wlan1\x00\x1b\xe1\xec\xd8\x01\x04\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2C\x93\t\xf6\xdb\xc3:{\xe3\xd6\xe0|6r\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5z\xd4[\xe5\x8e\xb31C\x00c\x81\x0f\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xe4\x1c\xad\xcc\x949\x10]\xb4\x1dzt\xdaP\x89\xeb\x01\xc6\xf9Lq\x8afp\x1bl\xbe\x11\xf6\x92.r\x94Rk\x811:n[rz\xd1?\xe4sq\xc3J\x15\x97C\x12%\x1d[^\xac\b\xc0\x99t\xadw(\x9f\xf6\x81\x83\x95Q\xa5\x9f\xa3\x0fy\x9c\xf3\x9c\x82\x99\xfb\xe4\xe2\x05C\xdf\x1cKm\x15(C\xbcZ;\xf2@d\xe0J\v\xc2(\xc6\xe9\xca\xfa\xda]RX\'RQ\xa2\x9e\x1dH\xe5G\xee\xdcS\xd3\xfe\x89\xd9\v\a\x88\x8d\x10.\x891pJ\xed\x11M\v\xef\xdf\xea2]\xb0%\x1b\xc1Kn\x01x\xa0\x18t\xac\xcd\x9e\xe6\x94\x84\xe2\x88\x1b!\x8d\x9dY\x13x\xd9\xbd\x7f\xf9\xb7q\xbc\tm\xfc\xc6r7\x96hy\xd4\x9b\x7f\x14\xff\xbd\xe9\x9f\xa8\xcb&\xd1V\x04\xbc\xb1-\xbc8o\\\xaa\xb4\xfcM\xf2\xc5@\xcaG3l\x91E\xbd\xa6%\r\xee\x11}Q\x19b\xfa\xa4YJ\xf9+\'N1\xf3\x1e\xa7\xdad\x02\x81\x88x~\xb0n\xc4\x83G\x90\"\x055\xa9\x14\xa1\b\xce\xb3\x85\xfe^\xbc\xb0\xa1\x0fv\xb1\xe1(O\x1e\xf0\x9a\xdc\x95\x85\x9a\x9ek\x1ax3gv\xa3,\x14\xf6Q\xcc\xf3\a\x1c\xb8\xa1\xd2\x1ap3\xb7\xbd\xbf\xf7\x86\x96\x14\x99\xf7w\x89\x83') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 1137.204171][ T35] audit: type=1800 audit(1608048913.053:2224): pid=10173 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=750 res=0 errno=0 [ 1137.253720][ T9821] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1137.280083][ T9821] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1137.328408][ T9821] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 [ 1137.360310][ T9821] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1137.444754][ T9821] usb 3-1: config 0 descriptor?? [ 1137.608260][T10180] device wlan1 left promiscuous mode [ 1137.829622][T10184] device wlan1 entered promiscuous mode [ 1137.851915][T10180] device wlan1 left promiscuous mode [ 1137.965428][ T9821] saitek 0003:06A3:0621.0007: item fetching failed at offset 0/1 [ 1137.982051][ T9821] saitek 0003:06A3:0621.0007: parse failed [ 1137.997860][ T9821] saitek: probe of 0003:06A3:0621.0007 failed with error -22 [ 1138.185473][T10157] device wlan1 entered promiscuous mode 16:15:15 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:15 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000100)=@phonet, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000000200)=""/244, 0xf4}], 0x2, &(0x7f00000003c0)=""/53, 0x35}, 0x22) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) r2 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) r3 = signalfd(r0, &(0x7f0000000c80)={[0x7]}, 0x8) mq_notify(r3, &(0x7f0000000cc0)={0x0, 0x27}) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') r4 = socket(0x10, 0x80000, 0x80000000) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x2f, 0x2, 0x1, 0x8, 0x2, @dev={0xfe, 0x80, [], 0xc}, @local, 0x7, 0x7800, 0x5, 0xffff7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000005c0)={@dev={0xfe, 0x80, [], 0x22}, 0x63, r5}) 16:15:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x8000000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:15 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11, 0x5], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0xc2, 0x0) getsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:15:15 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000080)={0x18}, 0x75) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f0000000000)) ptrace$peek(0x3, 0xffffffffffffffff, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000100), &(0x7f0000000140)=0x4) socket$kcm(0x29, 0x2, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000080)={0x18}, 0x75) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r3, &(0x7f0000000080)={0x18}, 0x75) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r4, &(0x7f00000077c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r4, &(0x7f0000004200)={0x50, 0x0, r5, {0x7, 0x1f, 0x0, 0x23990}}, 0x50) write$FUSE_INTERRUPT(r3, &(0x7f0000000180)={0x10, 0x0, r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 1139.217995][T10579] usb 3-1: USB disconnect, device number 31 [ 1139.308921][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:15:15 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x9000000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1139.592634][T10230] device wlan1 left promiscuous mode 16:15:15 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) splice(r2, 0x0, r4, 0x0, 0x18, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000140)='gtp\x00') pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r5, &(0x7f0000000080)={0x18}, 0x75) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1e, 0xf, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @map_val={0x18, 0x3, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x800}, @map={0x18, 0x4, 0x1, 0x0, r2}, @map={0x18, 0xa, 0x1, 0x0, r3}, @call={0x85, 0x0, 0x0, 0x94}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, &(0x7f0000000140), 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0xf, 0x3, 0x1}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 16:15:15 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11, 0x6], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1139.973354][T10579] usb 3-1: new high-speed USB device number 32 using dummy_hcd 16:15:15 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1140.100976][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:15:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x90302ff, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1140.344424][T10579] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1140.359585][T10246] device wlan1 entered promiscuous mode 16:15:16 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1140.427225][T10579] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1140.453864][T10579] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 [ 1140.484470][T10579] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1140.516424][T10579] usb 3-1: config 0 descriptor?? [ 1140.542026][T10245] device wlan1 left promiscuous mode [ 1140.987999][T10262] device wlan1 entered promiscuous mode [ 1141.155197][T10579] saitek 0003:06A3:0621.0008: item fetching failed at offset 0/1 [ 1141.168928][T10579] saitek 0003:06A3:0621.0008: parse failed [ 1141.193441][T10579] saitek: probe of 0003:06A3:0621.0008 failed with error -22 [ 1141.367288][T10230] device wlan1 entered promiscuous mode 16:15:18 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f00000000c0)={0x0, @reserved}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 16:15:18 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11, 0x7], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:18 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xa000000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r4, &(0x7f0000000080)={0x18}, 0x75) ioctl$KVM_REINJECT_CONTROL(r4, 0xae71, &(0x7f0000000000)={0x7f}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:15:18 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000100)=@phonet, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000000200)=""/244, 0xf4}], 0x2, &(0x7f00000003c0)=""/53, 0x35}, 0x22) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) r2 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) r3 = signalfd(r0, &(0x7f0000000c80)={[0x7]}, 0x8) mq_notify(r3, &(0x7f0000000cc0)={0x0, 0x27}) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') socket(0x10, 0x80000, 0x80000000) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x2f, 0x2, 0x1, 0x8, 0x2, @dev={0xfe, 0x80, [], 0xc}, @local, 0x7, 0x7800, 0x5, 0xffff7fff}}) [ 1142.580257][ T9783] usb 3-1: USB disconnect, device number 32 [ 1142.648817][T10294] device wlan1 left promiscuous mode [ 1142.678407][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1142.717422][ T35] kauditd_printk_skb: 12 callbacks suppressed [ 1142.717466][ T35] audit: type=1800 audit(1608048918.563:2237): pid=10302 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=1012 res=0 errno=0 [ 1142.972736][ T35] audit: type=1800 audit(1608048918.633:2238): pid=10304 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=759 res=0 errno=0 [ 1143.080039][ T35] audit: type=1800 audit(1608048918.923:2239): pid=10291 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=1013 res=0 errno=0 16:15:19 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:19 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11, 0x8], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xe000000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1143.185778][ T35] audit: type=1800 audit(1608048918.963:2240): pid=10304 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=760 res=0 errno=0 [ 1143.365335][T10299] device wlan1 entered promiscuous mode [ 1143.532789][ T9783] usb 3-1: new high-speed USB device number 33 using dummy_hcd [ 1143.543777][T10305] device wlan1 left promiscuous mode [ 1143.545660][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1143.570630][ T35] audit: type=1800 audit(1608048919.413:2241): pid=10325 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=761 res=0 errno=0 16:15:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xf000000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:19 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11, 0x9], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1143.678640][ T35] audit: type=1800 audit(1608048919.453:2242): pid=10327 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=1014 res=0 errno=0 16:15:19 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1143.778483][ T35] audit: type=1800 audit(1608048919.483:2243): pid=10318 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=762 res=0 errno=0 [ 1144.082176][ T35] audit: type=1800 audit(1608048919.483:2244): pid=10327 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=1015 res=0 errno=0 [ 1144.131253][ T35] audit: type=1800 audit(1608048919.923:2245): pid=10341 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=1016 res=0 errno=0 [ 1144.184252][ T9783] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1144.222126][ T9783] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1144.273336][ T9783] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 [ 1144.290900][ T35] audit: type=1800 audit(1608048919.993:2246): pid=10333 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=1017 res=0 errno=0 [ 1144.327075][ T9783] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1144.371194][ T9783] usb 3-1: config 0 descriptor?? [ 1144.399300][T10294] device wlan1 left promiscuous mode 16:15:20 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000003ac0)='/dev/nvme-fabrics\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000002f00)={'wg1\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000a1ee78d9acef1f140000000007009a353543e46e097c4c2f05e64bdf93c4426179e378f5eb6e3df8e4006f8be15e2bdd6ce9eb80fa1694aff06f31c1be689a1eb8c5cf3eddc557838e78c0387c1ba586a77913ee00"/101, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00'], 0x1c}, 0x1, 0x0, 0x0, 0x2000c010}, 0x0) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000003b00)={r4, 0x1, 0x6, @dev={[], 0x1a}}, 0x10) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x6380, 0x0) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, &(0x7f0000000240)=0x224515, 0x4) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/mm/transparent_hugepage/khugepaged/scan_sleep_millisecs\x00', 0x1, 0x0) 16:15:20 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11, 0xa], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:20 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x10000000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) splice(r2, 0x0, r3, 0x0, 0x18, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, 0x0, &(0x7f0000000040)) r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={r2, r5, 0x16}, 0x10) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f0000000100)=""/118) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 1144.976504][ T9783] saitek 0003:06A3:0621.0009: item fetching failed at offset 0/1 [ 1144.986597][ T9783] saitek 0003:06A3:0621.0009: parse failed [ 1144.992582][ T9783] saitek: probe of 0003:06A3:0621.0009 failed with error -22 [ 1145.018608][T10365] device wlan1 entered promiscuous mode [ 1145.315860][T10305] device wlan1 entered promiscuous mode [ 1145.338918][T10365] device wlan1 left promiscuous mode [ 1145.549521][T10376] device wlan1 entered promiscuous mode 16:15:22 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11, 0xe], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:22 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_LEAVE_MESH(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x8, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4008090}, 0x40) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:15:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x11000000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:22 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000100)=@phonet, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000000200)=""/244, 0xf4}], 0x2, &(0x7f00000003c0)=""/53, 0x35}, 0x22) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) r2 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) r3 = signalfd(r0, &(0x7f0000000c80)={[0x7]}, 0x8) mq_notify(r3, &(0x7f0000000cc0)={0x0, 0x27}) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') socket(0x10, 0x80000, 0x80000000) 16:15:22 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x88, 0x67, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={r0}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 1146.360331][T19185] usb 3-1: USB disconnect, device number 33 [ 1146.451828][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:15:22 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11, 0xf], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1146.920430][T10397] device wlan1 left promiscuous mode 16:15:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x20000000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1147.133390][T19185] usb 3-1: new high-speed USB device number 34 using dummy_hcd [ 1147.246346][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1147.282265][T10402] device wlan1 left promiscuous mode 16:15:23 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:23 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11, 0x10], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1147.513741][T19185] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1147.538176][T19185] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1147.587821][T19185] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 [ 1147.656445][T19185] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1147.660478][T10410] device wlan1 entered promiscuous mode 16:15:23 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x1, 0xc00c2) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000280)={0x10000, 0x2, 0x6, 0x1, &(0x7f0000000240)=[{0x101, 0x4c, 0x8001, 0x1}]}) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x88, 0x67, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) fstatfs(r1, &(0x7f00000002c0)=""/106) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, r3, 0x2, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xfff}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x7f}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40080}, 0xc000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e23, @loopback}}, 0x3, 0x8, 0xffffffff, 0x222a}, &(0x7f00000004c0)=0x98) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000540)) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000500)={0x3ff, 0x400, 0x4, 0x7, 0x8, 0x8, 0x6, 0xfff, r5}, 0x20) 16:15:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x20000180, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) keyctl$clear(0x7, 0xfffffffffffffffa) [ 1147.752472][T19185] usb 3-1: config 0 descriptor?? [ 1147.872335][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1147.953707][ T35] kauditd_printk_skb: 12 callbacks suppressed [ 1147.953726][ T35] audit: type=1800 audit(1608048923.753:2259): pid=10442 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=1024 res=0 errno=0 [ 1148.061293][ T35] audit: type=1800 audit(1608048923.873:2260): pid=10432 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=1025 res=0 errno=0 [ 1148.107234][ T35] audit: type=1800 audit(1608048923.953:2261): pid=10446 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=769 res=0 errno=0 [ 1148.304429][T10437] device wlan1 left promiscuous mode 16:15:24 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1148.325537][T19185] saitek 0003:06A3:0621.000A: item fetching failed at offset 0/1 [ 1148.346234][T19185] saitek 0003:06A3:0621.000A: parse failed [ 1148.393070][T19185] saitek: probe of 0003:06A3:0621.000A failed with error -22 [ 1148.464685][ T35] audit: type=1800 audit(1608048924.313:2262): pid=10429 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=770 res=0 errno=0 16:15:24 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x3f000000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1148.576899][ T35] audit: type=1800 audit(1608048924.393:2263): pid=10460 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=1026 res=0 errno=0 [ 1148.656412][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:15:24 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11, 0x48], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1148.883489][ T35] audit: type=1800 audit(1608048924.613:2264): pid=10467 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=771 res=0 errno=0 [ 1149.035191][ T35] audit: type=1800 audit(1608048924.883:2265): pid=10463 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=772 res=0 errno=0 [ 1149.055291][T10447] device wlan1 entered promiscuous mode [ 1149.062308][T10402] device wlan1 entered promiscuous mode 16:15:25 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000100)=@phonet, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000000200)=""/244, 0xf4}], 0x2, &(0x7f00000003c0)=""/53, 0x35}, 0x22) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) r2 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) r3 = signalfd(r0, &(0x7f0000000c80)={[0x7]}, 0x8) mq_notify(r3, &(0x7f0000000cc0)={0x0, 0x27}) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 16:15:25 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x40000000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000006c0)='tls\x00', 0xffffffffffffff6b) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) splice(r4, 0x0, r5, 0x0, 0x18, 0x0) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000080)=0xffffffff, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000240)='illinois\x00', 0x9) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) r6 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) pwritev(r6, &(0x7f0000000640)=[{&(0x7f0000000100)="24b84a1fb3eceb6c9dba98914f37345041f632525933116942b36c1beae5ccba74ae1283095a509fa25bcb24e673c1e6a04e6545ed6f65b23c753e7276aac36f6ffed5f57d173ae9f1b595d3939c18b17f0de827f7c02111908d9fbb525c3fc64cb042ad12cd83b2073e495d70bd5655a94480eb72b99d1a09f300d74755fc5eca46ae0035f7387d501e6eb42dc5d0ff2c", 0x91}, {&(0x7f00000002c0)="4e2f1e71a1c52cc759caded2bb58a09df3d31304faf0c8df1185d163609f633131fe1109ed6371f96a53c858f0f8f43f470fd049d42cf194dfbbe6011a4fec4ee8b9f76b3483772ed2b9bfc534a6c2ce1b4999aee41550c6999cf3eefdf0c605e1403ca5d783f23b299299f4a7fb76b9bac47dbd9cd87ad2da531e6bfdfee43f7af431406e9832353c5bb4574dffc8ff8096be31b789b98618c2336e428c1539dbb59a0168bf7fdcc19c3db655c6a6c552fb76e3c3844c3fbfd103ca192dc7e4e26e42b64b149bf8cc2528f81da9c3cab51dbadb02ef3c9bf163f0710c4fe6ed2f28b2b74ccfc9315a88b2c27d63", 0xee}, {&(0x7f00000001c0)="8c44b1dc16e602b5c8f218f558ba0ad5b39433d83838d51c2a970933b9e50140bd807dfcd477e8edf54530b19438371e000898c2a7948c25048e08c8824acf7f35587495503b956e42b9d4002cdb907073bcb9518d7d0fba122786d8c512c5cff6120c236b95a471dd8e", 0x6a}, {&(0x7f00000003c0)="eaa79decaf577eae2407e8bafe1ca71bf4ccc6e35bcdd6f406f451c5aee8fe704465f6d4bc5654d4f96e2af4006d1ba167269eca12211556df5e3c548c06b98feaf2219168c6507b5357950075318da738709f6eb2e3d69a97997405c77e691e14b79ba0e4dbe8d6ded7c449632783644d7ad1cddbe070", 0x77}, {&(0x7f0000000440)="2f017669ee50fb1dfdc787fd8f6f0a2681be1d64201fd2f04780c8551317f3afa41c6f5210e2a82717cf3f81271b885dac78376116cb4e3821109d86e86d0ccb7135dc16171be0dcc162cf100b9b8fca452cbb92e0f3424a05a1b30fd70b05044a7c5a384d496dbc881d4f6168952882ea6aa1841aaf2c1188a8f00cd8bf42aad48a11548bb0b461f5ee67b4d14f33ef6f4fb049ec5d14de7ab1f0a948478e358db91e5ebc0b4d25cbd8ec493048ee71471a1e9ee0f2b08b74c61e90824668d82910f51abc08ef50e0953647a48d84b218fc19c1ac7b5d053cba404cdca141ecf388ef732153ac19b1dc14", 0xeb}, {&(0x7f0000000540)="d5c12c0efa6f79e0d8cf7c185e80b362a9b92be3b5602668a3c76f020d4979a219e346e458c369b7507cb3bcf83e8648f523e8b42d60f13558aea5e281301492f4b54ce2d3c418b7a8fa238db30205735a472eb043518fdeaf30a664c6e89a8466d9f19a2dfabfdbe696fa7c3ed1004737812d359ec8e2c6e17173b759ffdfa13c5f8dfd3ed79b87f0d749cccf2b784e98dd4adc8396ddd5b902c41ddcc84510955ed56b94440d70b1f41e766c6388483820e5b58061de249533df8349b251ddd4b43a1bc2e6e106", 0xc8}], 0x6, 0xc41e, 0xfffffff7) 16:15:25 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') socket$kcm(0x29, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r3, 0x0, 0x18, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000840)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xcd%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd7*\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc1\xccQ\t\x00f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaar\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2&/\x06c\xaf\xfe\a\x92g\\`\xfd9\xeaq\xadC\xb0\xd4\xa86\x7fs\xbdIQ\x88\xece\\\xb4\xce\x9c\xdd\x9f&i-\x1d\x13Xu\xfev\xd6\"\xf2\xc3\xdc\xffX\x88\x15\xbb\xfc\x0e\xab\xae`\xf1[<\x86o\xfe\xe9M\xec\xa2\x91\xe2\xff*>\xb3\xe6\x15\x9cx\x81\x8bT\x17Cl\xc1\xa7\xe99\xbd\xf8\xec\xee\x84Z\x99\xa5b\xaf\xa6\xd2\x91c\x80\"l\x11\xaaN\x91\xc7x\xf2wln\xac$U@\x90\xf3:\x85\xe2\xb9!\r\xb1\xabU\xe7\xf9\xf2\xa6\xea\x01\xdf\xee\xa5rL\x95\x84s\xe7\xeb\xb1\xb1\xb3\x04X\xa7\xb5T^ 0\xfa\xfdG\xe9\xe7j\xe3\xdfU\xc6E_\xe8\x9c\x1b\r\xac\xc2\xa0\xea\xa1\x8b\x8ax=/2\xb4\xc1\xd4\x9e\xcd\x1bzq)/p0xee00}, 0x8001, 0xff}) setfsuid(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') socket$kcm(0x29, 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000100)={&(0x7f00000000c0)=[0x7f, 0x4, 0x4], 0x3, 0x80800}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) splice(r2, 0x0, r3, 0x0, 0x18, 0x0) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x8) ioctl$vim2m_VIDIOC_STREAMOFF(r4, 0x40045612, &(0x7f00000001c0)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5#\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xfb\xff\xff\xff2') 16:15:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) r4 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r4, 0x88, 0x67, &(0x7f0000000040)=r4, 0x4) sendmsg$kcm(r4, &(0x7f0000000480)={&(0x7f0000000080)=@nl=@proc={0x10, 0x0, 0x25dfdbfc, 0x100000}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000140)="52b4a3d57314b58673bc917444ba5b7e77739d0c9005e99a559d1a9ed7f300f87375eea80fe7681d7b9c8bcaca605866a41ad4248da2b0f3640642661c1be17abf150550986a72f2f97ac4b046", 0x4d}], 0x1, &(0x7f0000000180)}, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r4, 0x1, 0x53, &(0x7f0000000000)={0x7, 0x7, 0x1}, &(0x7f0000000100)=0x28) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 1165.514597][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1165.532460][T10849] device wlan1 left promiscuous mode [ 1166.306143][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:15:42 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000100)=@phonet, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000000200)=""/244, 0xf4}], 0x2, &(0x7f00000003c0)=""/53, 0x35}, 0x22) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) r2 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) r3 = signalfd(r0, &(0x7f0000000c80)={[0x7]}, 0x8) mq_notify(r3, &(0x7f0000000cc0)={0x0, 0x27}) syz_usb_control_io(r2, 0x0, 0x0) 16:15:42 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:42 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x8}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xe8030000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:42 executing program 1: socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000180)='wlan1\x00\x1b\x1al\xd8n\xff\xc3\x87\xe2\xa3\x80o\f\x01\xff\x80\xd0\xefL\x06\xb7\x16\x03F\xd9\x1f\xb9\xf2-\xdam\xe0\x00\x00\xe3\xd9;\xea\x84\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\b\x00\x00\x00\x00\x00\x00\x00r6Z\xe1\xc9\x86\xfe\x175\xd8\x06\x84\xf6\xf6\x9e\x8cF\xe9\x1d\xec*\xad\xf5\x03\x92S\x03\x13\x80%\x81\x11\xbe\x9a\xe8hTM\b\xf0}\xec\xe8f\xaao`\xc8\xce\xb4\xb8\xae\xf1v\xef\xe5AjZU\xba\xce\xe42\x84\xcf\x81\xf5\x85\xbd\xe2\\_\xf1\xd4\t\xb2\x0e\xd8\x82\xc3$S\xeb\xb1\xf7\x027') r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nvram\x00', 0x4000, 0x0) bind$pptp(r1, &(0x7f0000000300)={0x18, 0x2, {0x3, @rand_addr=0x64010100}}, 0x1e) syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0xf, 0x50403) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e24, 0x1f, @private2, 0xfff}}, 0x40, 0x3, 0x7, 0x2, 0xd1, 0x1, 0x2}, &(0x7f0000000000)=0x9c) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240)=@assoc_id=r2, 0x4) 16:15:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "038b1bbf831cd26200", "ff59af00", "eab6a14f6b1b6cf1"}, 0x17) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 1166.531175][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1166.548275][ T9783] usbhid 3-1:0.0: can't add hid device: -71 [ 1166.556753][T10869] device wlan1 entered promiscuous mode [ 1166.562814][ T9783] usbhid: probe of 3-1:0.0 failed with error -71 [ 1166.772003][ T9783] usb 3-1: USB disconnect, device number 39 [ 1166.814285][ T35] audit: type=1800 audit(1608048942.623:2295): pid=10876 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=802 res=0 errno=0 [ 1166.948047][ T35] audit: type=1800 audit(1608048942.793:2296): pid=10870 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=803 res=0 errno=0 16:15:42 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xf4010000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:42 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x9}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:42 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/schedstat\x00', 0x0, 0x0) sendmmsg$inet_sctp(r3, &(0x7f0000000540)=[{&(0x7f0000000300)=@in={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000400)="8b9fd994c9749c20d039d7e6deb730882c6d85ae561f616d2066de0299a0ae9371dfe30498d0e3314919fcbe6478778c1bce5f1c87701549aadba3662af99679131d462893959d4482f15fd24ffc4008c2efe0794fe003937012ec2e857938a809b25b315c2181ffa80bca2a961d6de9764325ec40bc6ddd83bf4acf397a26cdf9b4", 0x82}], 0x1, &(0x7f0000000500)=[@prinfo={0x18, 0x84, 0x5, {0x10, 0x7}}], 0x18, 0x801}], 0x1, 0x28000000) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000080)={0x18}, 0x75) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') ioctl$HIDIOCGCOLLECTIONINDEX(r4, 0x40184810, &(0x7f00000002c0)={0x3, 0x100, 0x1, 0x0, 0x0, 0x7}) sendmsg$BATADV_CMD_TP_METER_CANCEL(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="20002abd7000fbdbdf250300000008000600", @ANYBLOB="05002e000100000008003b00080000000500370001000000810009000ddf596f16e30090800034000500"], 0x48}, 0x1, 0x0, 0x0, 0x20008091}, 0x4c080) r6 = socket(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xfff3, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{0x8004}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x3, 0x0, 0x5d5}}}}]}, 0x78}}, 0x0) getpeername$packet(r3, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) socket(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, r5, 0x110, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r9}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4005}, 0x20008010) [ 1167.181039][T10896] device wlan1 left promiscuous mode [ 1167.397312][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1167.424116][ T35] audit: type=1800 audit(1608048943.273:2297): pid=10905 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=804 res=0 errno=0 16:15:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0xa}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xf5ffffff, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1167.518439][ T35] audit: type=1800 audit(1608048943.363:2298): pid=10903 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=805 res=0 errno=0 [ 1167.543423][ T9783] usb 3-1: new high-speed USB device number 40 using dummy_hcd [ 1168.043748][ T9783] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1168.063553][ T9783] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1168.100380][ T9783] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 [ 1168.123234][ T9783] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1168.143023][ T9783] usb 3-1: config 0 descriptor?? 16:15:45 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000100)=@phonet, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000000200)=""/244, 0xf4}], 0x2, &(0x7f00000003c0)=""/53, 0x35}, 0x22) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) r2 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) r3 = signalfd(r0, &(0x7f0000000c80)={[0x7]}, 0x8) mq_notify(r3, &(0x7f0000000cc0)={0x0, 0x27}) syz_usb_control_io$hid(r2, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) 16:15:45 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:45 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000080)={0x18}, 0x75) ioctl$USBDEVFS_DROP_PRIVILEGES(r2, 0x4004551e, &(0x7f00000001c0)) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000080)={0x18}, 0x75) ioctl$HIDIOCGRAWNAME(r1, 0x80404804, &(0x7f0000000180)) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') r4 = fsmount(0xffffffffffffffff, 0x0, 0x1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x3, 0xffffffffffffffff, 0x1c, 0x0, @in={0x2, 0x4e21, @private=0xa010101}}}, 0xa0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/asound/timers\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000240)) 16:15:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0xe}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:15:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xfe800000, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1170.003487][ T9783] usbhid 3-1:0.0: can't add hid device: -71 [ 1170.009693][ T9783] usbhid: probe of 3-1:0.0 failed with error -71 [ 1170.026172][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1170.056391][T10933] device wlan1 entered promiscuous mode [ 1170.079667][ T9783] usb 3-1: USB disconnect, device number 40 [ 1170.398822][ T35] audit: type=1800 audit(1608048946.243:2299): pid=10949 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=806 res=0 errno=0 [ 1170.418907][T10933] device wlan1 left promiscuous mode [ 1170.453617][ T35] audit: type=1800 audit(1608048946.293:2300): pid=10934 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=807 res=0 errno=0 16:15:46 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xff020309, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:46 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0xf}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1170.863927][ T9783] usb 3-1: new high-speed USB device number 41 using dummy_hcd [ 1170.884374][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1170.905526][ T35] audit: type=1800 audit(1608048946.753:2301): pid=10966 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=808 res=0 errno=0 [ 1170.975437][T10952] device wlan1 entered promiscuous mode 16:15:46 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 1171.031181][ T35] audit: type=1800 audit(1608048946.873:2302): pid=10959 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=809 res=0 errno=0 16:15:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000001340)='/dev/zero\x00', 0x0, 0x0) madvise(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x4) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10, r3, 0x0) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:15:47 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1171.212010][T10971] device wlan1 left promiscuous mode [ 1171.246507][ T9783] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1171.281052][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1171.303357][ T9783] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1171.330243][ T35] audit: type=1800 audit(1608048947.173:2303): pid=10977 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=810 res=0 errno=0 [ 1171.351509][ T9783] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 [ 1171.402371][ T9783] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1171.467811][ T9783] usb 3-1: config 0 descriptor?? [ 1171.563407][ T35] audit: type=1800 audit(1608048947.403:2304): pid=10974 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=811 res=0 errno=0 [ 1171.706508][T10975] device wlan1 entered promiscuous mode [ 1171.722928][T10971] device wlan1 left promiscuous mode [ 1172.051271][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:15:48 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x10}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xffffff7f, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000080)={0x18}, 0x75) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x1e, 0x1cb, &(0x7f00000002c0)="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"}) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:15:48 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000100)=@phonet, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000000200)=""/244, 0xf4}], 0x2, &(0x7f00000003c0)=""/53, 0x35}, 0x22) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) r2 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) r3 = signalfd(r0, &(0x7f0000000c80)={[0x7]}, 0x8) mq_notify(r3, &(0x7f0000000cc0)={0x0, 0x27}) syz_usb_control_io$hid(r2, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) 16:15:48 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:48 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000000)) io_getevents(0x0, 0x1, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f00000001c0)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x400000, 0x0) connect$netlink(r2, &(0x7f0000000300)=@unspec, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x100, 0x0) read$hidraw(r3, &(0x7f0000000280)=""/25, 0x19) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x4, &(0x7f0000000200)=0x40, 0x4) [ 1173.123570][ T9783] usbhid 3-1:0.0: can't add hid device: -71 [ 1173.128775][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1173.129975][ T9783] usbhid: probe of 3-1:0.0 failed with error -71 16:15:49 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 1173.385897][ T9783] usb 3-1: USB disconnect, device number 41 [ 1173.639727][ T35] audit: type=1800 audit(1608048949.473:2305): pid=11000 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=812 res=0 errno=0 [ 1173.678243][T11014] device wlan1 entered promiscuous mode 16:15:49 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:49 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x11}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xffffff8d, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1173.756254][ T35] audit: type=1800 audit(1608048949.563:2306): pid=11010 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=813 res=0 errno=0 [ 1173.782663][T11014] device wlan1 left promiscuous mode [ 1173.910380][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1174.071532][ T35] audit: type=1800 audit(1608048949.913:2307): pid=11028 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=814 res=0 errno=0 [ 1174.231808][ T35] audit: type=1800 audit(1608048950.063:2308): pid=11025 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=815 res=0 errno=0 16:15:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:50 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x48}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1174.294799][ T9783] usb 3-1: new high-speed USB device number 42 using dummy_hcd 16:15:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xfffffff5, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1174.944557][ T9783] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1174.955726][ T9783] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1174.965796][ T9783] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 [ 1174.975085][ T9783] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1174.996176][ T9783] usb 3-1: config 0 descriptor?? 16:15:52 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000100)=@phonet, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000000200)=""/244, 0xf4}], 0x2, &(0x7f00000003c0)=""/53, 0x35}, 0x22) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) r2 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) r3 = signalfd(r0, &(0x7f0000000c80)={[0x7]}, 0x8) mq_notify(r3, &(0x7f0000000cc0)={0x0, 0x27}) syz_usb_control_io$hid(r2, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) 16:15:52 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000140)={r0, 0x9, 0x2, 0x1}) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f00000001c0)={0x0, 0x6663, 0x40, &(0x7f0000000180)=0x2}) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000000)={0x17, 0x8, 0x15, 0x2, 0x6, 0x6c0, 0x1, 0x15a, 0xffffffffffffffff}) 16:15:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x109000, 0x0) ioctl$BLKBSZSET(r4, 0x40081271, &(0x7f0000000100)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:15:52 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x4c}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:52 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0xffffffff, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1176.669157][T11061] device wlan1 entered promiscuous mode [ 1176.683472][ T9783] usbhid 3-1:0.0: can't add hid device: -71 [ 1176.689771][ T9783] usbhid: probe of 3-1:0.0 failed with error -71 [ 1176.728744][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1176.761171][ T9783] usb 3-1: USB disconnect, device number 42 [ 1176.784149][ T35] kauditd_printk_skb: 2 callbacks suppressed [ 1176.784166][ T35] audit: type=1800 audit(1608048952.633:2311): pid=11070 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=818 res=0 errno=0 16:15:52 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$CAPI_NCCI_GETUNIT(0xffffffffffffffff, 0x80044327, &(0x7f0000000000)=0x7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 16:15:52 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1177.066322][ T35] audit: type=1800 audit(1608048952.833:2312): pid=11070 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=819 res=0 errno=0 16:15:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0x0, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1177.176476][T11083] device wlan1 left promiscuous mode 16:15:53 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x68}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1177.346675][ T35] audit: type=1800 audit(1608048953.193:2313): pid=11088 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=820 res=0 errno=0 16:15:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x3, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1177.492336][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1177.515952][ T9783] usb 3-1: new high-speed USB device number 43 using dummy_hcd [ 1177.564181][ T35] audit: type=1800 audit(1608048953.413:2314): pid=11082 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=821 res=0 errno=0 16:15:53 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1177.791415][T11086] device wlan1 entered promiscuous mode [ 1177.865085][T11083] device wlan1 left promiscuous mode [ 1177.943896][ T9783] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1177.967588][ T35] audit: type=1800 audit(1608048953.813:2315): pid=11104 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=822 res=0 errno=0 [ 1177.988949][ T9783] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1178.043312][ T9783] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 [ 1178.054657][ T35] audit: type=1800 audit(1608048953.863:2316): pid=11104 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=823 res=0 errno=0 [ 1178.102349][ T9783] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1178.144240][ T9783] usb 3-1: config 0 descriptor?? [ 1178.286130][T11098] device wlan1 entered promiscuous mode 16:15:55 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000100)=@phonet, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000000200)=""/244, 0xf4}], 0x2, &(0x7f00000003c0)=""/53, 0x35}, 0x22) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) r2 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) signalfd(r0, &(0x7f0000000c80)={[0x7]}, 0x8) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) 16:15:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x6c}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$hiddev(&(0x7f0000000000)='/dev/usb/hiddev#\x00', 0x10001, 0x200400) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) ioctl$CHAR_RAW_IOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000100)) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept4$inet6(r1, &(0x7f0000000140), &(0x7f0000000180)=0x1c, 0x80800) sendto$inet6(r4, &(0x7f00000001c0)="11215f2cb2b98b58bef2c73e674e9461044233de823b3620429e143d264ac55ed5f821dfe710b6d5b89ee9777c3f17ec48c83c75f7308238283c6ce8c13f8c0540d8046635384ffca1d2b833b85e7304b8299e166a43440d605f153488c058edc99d2231148acd27f79bd3e9a0506f6eaab3da025712c206ab20bbfcf9707a766bfc7d1f0df4a420aed3683651ad2fac4ce21f035e7f77749fac08b5fa", 0x9d, 0x11, &(0x7f00000002c0)={0xa, 0x4e22, 0xa99, @private2, 0x2}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:15:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x4, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:55 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:55 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000080)={0x18}, 0x75) ioctl$CHAR_RAW_REPORTZONE(r1, 0xc0101282, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 1179.787035][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1179.799324][T11125] device wlan1 left promiscuous mode [ 1179.805215][ T9783] usbhid 3-1:0.0: can't add hid device: -71 [ 1179.830576][ T9783] usbhid: probe of 3-1:0.0 failed with error -71 [ 1179.879366][ T35] audit: type=1800 audit(1608048955.723:2317): pid=11133 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=824 res=0 errno=0 [ 1180.136689][ T9783] usb 3-1: USB disconnect, device number 43 16:15:56 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x74}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x5, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1180.221267][ T35] audit: type=1800 audit(1608048956.063:2318): pid=11126 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=825 res=0 errno=0 16:15:56 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1180.533592][ T35] audit: type=1800 audit(1608048956.373:2319): pid=11155 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=826 res=0 errno=0 16:15:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x6, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1180.609887][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:15:56 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x7a}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:56 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1180.667160][ T35] audit: type=1800 audit(1608048956.413:2320): pid=11155 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=827 res=0 errno=0 [ 1180.703251][ T9783] usb 3-1: new high-speed USB device number 44 using dummy_hcd [ 1180.721563][T11131] device wlan1 entered promiscuous mode [ 1180.739971][T11160] device wlan1 left promiscuous mode [ 1181.073765][ T9783] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1181.104114][ T9783] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1181.171726][ T9783] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 [ 1181.207913][ T9783] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1181.225041][T11161] device wlan1 entered promiscuous mode [ 1181.243413][ T9783] usb 3-1: config 0 descriptor?? [ 1181.745287][ T9783] saitek 0003:06A3:0621.000E: item fetching failed at offset 0/1 [ 1181.753677][ T9783] saitek 0003:06A3:0621.000E: parse failed [ 1181.759729][ T9783] saitek: probe of 0003:06A3:0621.000E failed with error -22 16:15:58 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000100)=@phonet, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000000200)=""/244, 0xf4}], 0x2, &(0x7f00000003c0)=""/53, 0x35}, 0x22) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) r2 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) signalfd(r0, &(0x7f0000000c80)={[0x7]}, 0x8) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) 16:15:58 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:15:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x7, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0xffffffff, @private2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) ioctl$CHAR_RAW_GETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:15:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0xff}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:58 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) getsockopt$inet6_dccp_int(r0, 0x21, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r2 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)={'#! ', './file0', [{0x20, ':&::/$Z'}, {0x20, 'wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe'}, {0x20, '^-!'}, {0x20, '\':*(:{-:'}, {0x20, ':'}, {0x20, '!'}, {0x20, '}]!\x9c+('}], 0xa, "e5fbcb"}, 0x91) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 1182.960304][ T9783] usb 3-1: USB disconnect, device number 44 [ 1183.060478][T11204] device wlan1 left promiscuous mode [ 1183.263889][ T35] kauditd_printk_skb: 2 callbacks suppressed [ 1183.263904][ T35] audit: type=1800 audit(1608048959.113:2323): pid=11213 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=830 res=0 errno=0 16:15:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x8, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:15:59 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x2}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1183.429762][ T35] audit: type=1800 audit(1608048959.273:2324): pid=11207 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=831 res=0 errno=0 16:15:59 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1183.647608][ T9783] usb 3-1: new high-speed USB device number 45 using dummy_hcd 16:15:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x9, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1183.763603][T11209] device wlan1 entered promiscuous mode [ 1183.786114][T11204] device wlan1 left promiscuous mode [ 1183.810222][ T35] audit: type=1800 audit(1608048959.653:2325): pid=11233 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=832 res=0 errno=0 16:15:59 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x3}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:15:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000000)=@ccm_128={{0x303}, "5f4b0000d5ad36f2", "31d2d6b51c3acebce1c01f1f59164e5b", "123d0c6b", "ca6cf0239a9dbf6e"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 1184.013737][ T9783] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1184.062730][ T9783] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1184.118811][ T9783] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 [ 1184.166969][ T9783] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1184.201312][ T35] audit: type=1800 audit(1608048960.043:2326): pid=11239 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=833 res=0 errno=0 [ 1184.256353][ T9783] usb 3-1: config 0 descriptor?? [ 1184.303008][T11232] device wlan1 entered promiscuous mode [ 1184.323797][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1184.755254][ T9783] saitek 0003:06A3:0621.000F: item fetching failed at offset 0/1 [ 1184.766929][ T9783] saitek 0003:06A3:0621.000F: parse failed [ 1184.773100][ T9783] saitek: probe of 0003:06A3:0621.000F failed with error -22 [ 1185.116801][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:16:01 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x4}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0xa, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:16:01 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:01 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='btrfs_set_extent_bit\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 16:16:01 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000100)=@phonet, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000000200)=""/244, 0xf4}], 0x2, &(0x7f00000003c0)=""/53, 0x35}, 0x22) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) r2 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) 16:16:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r4, &(0x7f0000000080)={0x18}, 0x75) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r4, 0xc040564a, &(0x7f0000000100)={0x4d9, 0x0, 0x29, 0x9, 0x3, 0x9, 0x9}) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 1186.082761][ T9821] usb 3-1: USB disconnect, device number 45 [ 1186.171788][T11271] device wlan1 left promiscuous mode [ 1186.189706][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1186.357535][ T35] audit: type=1800 audit(1608048962.203:2327): pid=11282 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=834 res=0 errno=0 16:16:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0xb, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1186.623262][ T35] audit: type=1800 audit(1608048962.463:2328): pid=11272 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=835 res=0 errno=0 16:16:02 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2b, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:16:02 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1186.895220][T11276] device wlan1 entered promiscuous mode [ 1186.919391][T11271] device wlan1 left promiscuous mode [ 1186.925042][ T9821] usb 3-1: new high-speed USB device number 46 using dummy_hcd [ 1186.967279][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1186.978799][ T35] audit: type=1800 audit(1608048962.823:2329): pid=11300 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=836 res=0 errno=0 [ 1187.036695][ T35] audit: type=1800 audit(1608048962.853:2330): pid=11295 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=837 res=0 errno=0 16:16:03 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x41, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:16:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x6}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1187.398244][ T35] audit: type=1800 audit(1608048963.243:2331): pid=11311 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=838 res=0 errno=0 [ 1187.424743][ T9821] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1187.473243][ T9821] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1187.522006][ T9821] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 [ 1187.579564][T11297] device wlan1 entered promiscuous mode [ 1187.585681][ T9821] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 16:16:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x80, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:16:03 executing program 1: socket$kcm(0x29, 0x5, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x18, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 1187.686289][ T9821] usb 3-1: config 0 descriptor?? 16:16:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0x2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1187.807479][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1187.837264][ T35] audit: type=1800 audit(1608048963.683:2332): pid=11309 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=839 res=0 errno=0 [ 1188.265545][ T9821] saitek 0003:06A3:0621.0010: item fetching failed at offset 0/1 [ 1188.303871][ T9821] saitek 0003:06A3:0621.0010: parse failed [ 1188.334153][ T9821] saitek: probe of 0003:06A3:0621.0010 failed with error -22 [ 1188.591047][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:16:05 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000100)=@phonet, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000000200)=""/244, 0xf4}], 0x2, &(0x7f00000003c0)=""/53, 0x35}, 0x22) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) r2 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) 16:16:05 executing program 1: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x1000000, 0x200000) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000000c0)) socket$kcm(0x29, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x2f, 0x7, 0xe5, 0x40, 0x0, 0x6a, 0xc080, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x9, 0x6}, 0x40860, 0x1, 0x100, 0x3, 0x6, 0x3, 0x2}, 0x0, 0xe, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000002c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:v\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 16:16:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x7}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:05 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0x4, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:16:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 1189.480919][ T9821] usb 3-1: USB disconnect, device number 46 [ 1189.546665][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1189.666098][ T35] audit: type=1800 audit(1608048965.513:2333): pid=11367 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=840 res=0 errno=0 16:16:05 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 1189.829758][ T35] audit: type=1800 audit(1608048965.613:2334): pid=11371 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=841 res=0 errno=0 [ 1189.911719][T11374] device wlan1 left promiscuous mode 16:16:05 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x9}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1190.294349][ T35] audit: type=1800 audit(1608048966.143:2335): pid=11388 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=842 res=0 errno=0 [ 1190.340463][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1190.355999][ T9821] usb 3-1: new high-speed USB device number 47 using dummy_hcd [ 1190.366508][ T35] audit: type=1800 audit(1608048966.213:2336): pid=11379 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=843 res=0 errno=0 16:16:06 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1190.528084][T11376] device wlan1 entered promiscuous mode [ 1190.566331][ T35] audit: type=1800 audit(1608048966.413:2337): pid=11395 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=844 res=0 errno=0 [ 1190.586327][T11374] device wlan1 left promiscuous mode [ 1190.651577][ T35] audit: type=1800 audit(1608048966.453:2338): pid=11395 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=845 res=0 errno=0 [ 1190.773769][ T9821] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1190.787555][ T9821] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1190.819962][ T9821] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 [ 1190.846002][ T9821] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1190.878725][ T9821] usb 3-1: config 0 descriptor?? [ 1191.345133][ T9821] saitek 0003:06A3:0621.0011: item fetching failed at offset 0/1 [ 1191.364413][ T9821] saitek 0003:06A3:0621.0011: parse failed [ 1191.370468][ T9821] saitek: probe of 0003:06A3:0621.0011 failed with error -22 16:16:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r2, &(0x7f00000006c0)=[{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@op={0x18}], 0x18}], 0x3, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:16:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0x6, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:16:08 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:08 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0xb}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:08 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x1cbfe) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 16:16:08 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000100)=@phonet, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000000200)=""/244, 0xf4}], 0x2, &(0x7f00000003c0)=""/53, 0x35}, 0x22) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) r2 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) [ 1192.610185][ T9821] usb 3-1: USB disconnect, device number 47 [ 1192.679855][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1192.708208][T11427] device wlan1 entered promiscuous mode [ 1192.984711][T11433] device wlan1 left promiscuous mode [ 1193.013960][ T35] audit: type=1800 audit(1608048968.833:2339): pid=11425 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=846 res=0 errno=0 [ 1193.107901][ T35] audit: type=1800 audit(1608048968.943:2340): pid=11432 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=847 res=0 errno=0 16:16:09 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0xc}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:09 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1193.478719][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1193.493618][ T9783] usb 3-1: new high-speed USB device number 48 using dummy_hcd [ 1193.522668][ T35] audit: type=1800 audit(1608048969.363:2341): pid=11456 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=848 res=0 errno=0 [ 1193.628742][ T35] audit: type=1800 audit(1608048969.423:2342): pid=11456 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=849 res=0 errno=0 16:16:09 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sched_getscheduler(0xffffffffffffffff) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000100)={@val={0x0, 0xdada}, @val={0x1, 0x3, 0x8000, 0x2, 0x8001, 0x2}, @x25={0x1, 0x2, 0x5, "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"}}, 0x10c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xc008ae05, 0x400000) sendto$inet6(r0, &(0x7f00000002c0)="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", 0x14c, 0x0, 0x0, 0x0) 16:16:09 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1194.014653][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1194.063871][ T9783] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1194.115149][ T9783] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 16:16:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0x8, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:16:10 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000080)={0x18}, 0x75) write$cgroup_devices(r2, &(0x7f0000000000)={'c', ' *:* ', 'w\x00'}, 0x8) [ 1194.316349][ T9783] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 [ 1194.334305][ T9783] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1194.377511][ T9783] usb 3-1: config 0 descriptor?? 16:16:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000080)={0x18}, 0x75) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) sendto$inet6(r0, 0x0, 0x0, 0x20008044, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @private1={0xfc, 0x1, [], 0x1}}, 0x1c) sendmsg$AUDIT_LIST_RULES(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x3f5, 0xf617eb3edb4514fc, 0x70bd29, 0x25dfdbff, "", ["", "", "", "", ""]}, 0x10}}, 0x4000) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 1194.465317][T11480] device wlan1 entered promiscuous mode [ 1194.531134][T11480] device wlan1 left promiscuous mode 16:16:10 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0xf}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:10 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1194.802402][T11481] device wlan1 entered promiscuous mode [ 1195.055255][ T9783] saitek 0003:06A3:0621.0012: item fetching failed at offset 0/1 [ 1195.064653][ T9783] saitek 0003:06A3:0621.0012: parse failed [ 1195.072469][ T9783] saitek: probe of 0003:06A3:0621.0012 failed with error -22 [ 1195.086160][ T35] kauditd_printk_skb: 2 callbacks suppressed [ 1195.086175][ T35] audit: type=1800 audit(1608048970.933:2345): pid=11494 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=852 res=0 errno=0 [ 1195.215461][ T35] audit: type=1800 audit(1608048971.063:2346): pid=11494 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=853 res=0 errno=0 16:16:12 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000100)=@phonet, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000000200)=""/244, 0xf4}], 0x2, &(0x7f00000003c0)=""/53, 0x35}, 0x22) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) 16:16:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000080)={0x18}, 0x75) getsockopt$inet6_buf(r2, 0x29, 0xca, &(0x7f00000001c0)=""/57, &(0x7f0000000200)=0x39) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x11dc42, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@ccm_128={{0x304}, "d1689d0ed826f38d", "7617b8395e4f96cf0525bafd83e3505a", "6ea7fb9d", "d4c3bb5ecd4f3755"}, 0x28) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U-', 0x5}, 0x16, 0x3) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:16:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0x9, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:16:12 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x83, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x2, r0, 0x1c, 0x1, @in={0x2, 0x4e24, @multicast2}}}, 0xa0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') pipe(&(0x7f0000000280)={0xffffffffffffffff}) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) splice(r2, 0x0, r3, 0x0, 0x18, 0x0) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000000)) 16:16:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x10}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:12 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1196.270801][ T9783] usb 3-1: USB disconnect, device number 48 [ 1196.341923][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1196.361036][T11516] device wlan1 left promiscuous mode [ 1196.470050][ T35] audit: type=1800 audit(1608048972.313:2347): pid=11525 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=854 res=0 errno=0 [ 1196.584138][ T35] audit: type=1800 audit(1608048972.363:2348): pid=11525 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=855 res=0 errno=0 16:16:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x11}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:12 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1197.133394][ T35] audit: type=1800 audit(1608048972.973:2349): pid=11539 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=856 res=0 errno=0 16:16:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xa, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1197.185448][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1197.231071][ T35] audit: type=1800 audit(1608048973.073:2350): pid=11534 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=857 res=0 errno=0 16:16:13 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:13 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x14}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x101000) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0xfc, 0xffffffff, 0xfffffff9, 0x55, 0x4}, 0x14) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 1197.446121][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:16:13 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000100)=@phonet, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000000200)=""/244, 0xf4}], 0x2, &(0x7f00000003c0)=""/53, 0x35}, 0x22) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) 16:16:13 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f00000003c0)={{0x0, 0x0, 0x80, {0x2, 0xd000}}, "5aae7ed6433ff985e2e010dd53c9e1aaa9120fd79fc1560766a03376808f05b0447a4e48fa88a083294d48154973a27656d13b2ea65520429f0c1908606fa74078e3d6d9ba7af74a12791867d18fe2fff820ca9277321e6d14b6a2df6abc7865b7005b1b4b81fd6b9d913f80b5dbf695110c4d9a2cb54adb56d12e8307a6640fa3cda735d84e848dc1de80f53a6b86b691b48cd5df7fe5ae4bcdfaf46d877e6ecbbe97e560872c298457b6a5db371e447a71dd0590bc68c76e0dcdecc7ed2655123a115e73d4e8fcafb2499eb2f320670b5a0effa43e648f0929794f4c7dd4976ba288a4b957a11e795cba2579cadb57d71df655acd1e8a767d2f592bde0482dbe194e65e3454a2b9ee46e1ec7cd9f980825c095d396880028515c038c5de17ddb1ea7f4636098036c3ad7b3f6202e43baeef7759a4e8e3e0fe5c1eba379b551540b6ace98660e2e31ae3cf1db75330e5fc9911b82cc06f129de992f61dd28e0ccc9b31fdda7b07b40b2a141eaf7b25b4432b4caf5123d3accab05f72d3e5da1ec686c258e7f366ffc9701a59179664d16753340ce9869790b593aa88625f6346d38f59e27c32903c2dca988bcd5b21af02d79ac520399d6cc87b0b7a73eced909566165106ccb390d8b68f0ca185540acb7eda60fca13141bcc1abe57feaf19886ed31d007ae9b7891a7e6ec7de14914bedaa8d7aea53f3c728d7d6864411082d5f8336573f720f9cf513c752c4fc79e0860694f93ebdd5f7df677bc28440c900992d6e99ecb391efe6b97d12f8823fcce52a7cf99bf190ed2bf753d7ac78c9b3cf48d4bd0ba45736900829ddcad84957cc24adb1c918a9468a07d5b2b7be8ebcdea0d45a7c52e9d139bcedf94287d2f3dca153e134af171c742922d0efa7f6d5927baf539695678814c04f6bd0b5b4722797137aafc1d67b16a0611538b9de30ed4fedbbc6e27cf324c10c386924ee5538ca6cd145303dba64bb1445343a6a1b4c48c42d4f6f36680b0765929ed3dfe556f08d1b5a48220a3c0e6f962e27f80d53edc5f59457d4f29cc15429deb441ce1444b39ce5283584830febf5454de050e3d30a15a714d74b7eceb30ea4888b790a6413f2c006e11c6ae2dbb479190fb3f2e47969e13a6c87417e196fe2eb4b230f98d1acfe7cbdbb683505fbe78feee1558ae4d49bba6aeda751711eb3044fe6a925f4a6a6b20c2a2c23c60a26f89762a53208f3fbf4b78db5a9cfa3524fc6b37c73736be37c7b3a2e3d494adbc062f09bd004b37a371b51f3282043ff3362e5cd0815fee1d4a54c490064c8202109c0ddf62f7989ddf285b8077bd6484719a8c109d2bac1b70b5a8c5423e96049f1b80958a81482c171f05ca5a50bf78f7f9dd0163ed76a8a3be26e0335a4f03fbf48517c7f0c52ca44b90ce1a0e9fd7b3e6e4094bc5d5e0e632e2d45477a1f132279c3b36b76c6e9ea112e0ccbc0a8603e0dc98f260dae7ee05efb3575f1dc7e92e1db707580bef9146c845aacf30ab9c6c7a198f4437cf55638a2ffd5171ffc73baf72c984c96b505d839d7fde40f79dbdb8be304ce278e8292c57ed7b52fbb31af6ae07c3419b54f013df3768b079fd81d683a2c46b0d1ec96f4316b54e31b5060e0ea0d5f1f746b61f4ac5041cd1a8c471b17caa0a40a2446494700ccbbc8e6322da2c520a2390b365572dd2fa16978d6e48ba7f89233247d8d8eba3395d603f74896644e0cab8945177a4d6671323ccd595d3adcc39adee51a7f7695b3ee6511188069d56dd21250a2bd6e065aa4b2e7df64f62fce28465a596df6d9a3dcac2bbd2e4f8240da0187f0397db09e0e685a443085b1a604a44fcc4251fffb137b8a568ebc767de5e6eb6661c814c5bc63e9d2688ccfc9e004507bf4f1da1a02c71ab5668e889b50e8f2faf728b4cc60ca88feaac97e75cb3989e725cd4231efc9beaf95f8ace3feda0060788c7c3dbb353c147ed23d3bfad1bae318a8efa51653cb02e2a30d801d582d150da04e3f2f3f5ff8b2970bdcdc2fd497f9a737d1bbfbe1d2ffeb655a0ff7cc98ba66b3d10baf905722486cd3af6337591c7c042738cc1e08ec7ea3ed49c0d9265c320c835c8a806bbb0247cb87e6b78260c52926d423d89e5d10b413deebd20d3ac275c915d4321a2e7e4ba9121f5c5007868f27636490dd0ede800cc0aefe62d5443f20bc846d348fe811394c348edb1322ddfa8fc672b3ec44077318f500f5724e488e7ab04ba195652701b9c755ef9b05b8538504b5655175de990e9a10321bdeee56587008ae71c4ec97fe7e1537417148c7eeda8e3c6a208f675fdc6895b3e575a26ffd934ed6a3a62ac35dd535d66a68fad09c10ad89ff91364f675614900bb2a96bdef464f7261f03d756fb2cea25c04ab3ea368c91ff2dc1e1b569ac94ddb6b0ac9787c4d7ce13f4dca2bd4a6f70966e03ba1a70d456612223b0a12bcfa784a30056355834332f74d9e0b50a92b01528d4bc6b6b791b21bb36e8da64d2a19243b31b3eef68fdb5bf3825351a0d077d3eaf4801d4e04e2184b54875cf2e3628f9a03a491b850770b3313e3b8d1c09da1623b4cc0499ddf5bdc2914b0829799410375d1fcfedc808a152fd0f7f6b070237f38cc9cb0a6ad2f914096a135da1605d066de3195c814307e069f37e28f581ca02842e36fef405c698866e4eb4f20f5630491ebfc11bc7930bafa9aae6b2e1881ef953220a4c208c10afc336fdea2f245eb96e793958c8723a9fe24b066a26b57085935bf280c16fecc950f2559ef121153be9e1550f74f8fb6a9c8e79d60ea67a6b471cbd83b111cedc0335d7ecae51a43fce984311925cf4dd94b9d3bf4d9af6cb5817fb42b44ccc07f5c3abe0f0456733b41e0285f7feeb0b80d30b0a724d3f94ee3edbce58c5b704bdf081c1d888ed409f231d4c22d0e8eca1914c325d60c6bf42369a28f4ba740a6498bf288c36a0a4208806e0a87ca37a14accd52a068330ffb7de0a1dbe78d240b4a42e1d0180b26a6f74a5614e518705a7199edc9c3c1964bf2f7dc8e04b5decbc9c268153e4f6fb9bd1f0f2d51fa2661827191ed9f1da2fc0a03c88fdf880ca41bf82f415c396a9be887324ed953659e5f3cb63eb528131ec0ee17f2d60c4ad1fe29f5c17f267934051fde17c0ed010192639d66dffca4775302e477d4d563004f74ee797ea30db91dc064ad756fa312d99f3fe77eeeb5ed5897d547e1c34af224c58568b879eb2f503d1a468ba2c733e0e86c2ba32f9ebf461d3046d9b354b714b1c2ba1fe4c659c50deec23468744f2d601730db4308b1737a7e6e458089177139d0d65eb7fb187769c99cce9a2915f749d45160f30b0f99a3279cdf657ddee74e5f95538472ff647b9660140cc23f1951bf1f80600dfa86466bdac92d8e4089a7c2e76afd0bb2d0f96890bf42f16be7d29d7e38f21c74529b14ccf0e3462e8bfc05a225fc3d71ead30b6ae1dd988c1023fb6735e80236a5525a2b62e3be78fc019c1345220c2d7a41321fd24000c8faf3abc0c30354b032f925a4af465c50b58572f496281a63386fca7883837e0de70255779778f72fc46ae0f0bd2433da10c4cf6445375d2e26b060478281a696f88fec3ad93e0d4621d0ff8a3254f3ba897fd98d41df187f1555912942444fe330ebc069348a2be31648beff90116ba9261a0e69d41b12a0f5850cda62221543eb30866bcd290f1213ba1d1669d58fecc0d7391ab894a82a121e9b2587ebe651eaf1c1add5e872b0da32d35b1719cab3c0da2a480dc1ff3117d3683bc2b6cf1f8cbb0522ad2a40414cf8ee2204c9a7892a105ed31fdd13a47a324491706bf7f3fcdd9c6ed534f8ba528baff2f705e9e2cef1f413725b8ff980fb663f44d33e2f12eacb60d5db6efe2457cf36d5b10bc98b6309e90f32bd11cf4227769fd6a8dec1477212113825256601feaa018f289a061643b2b00213dfb7f6b8ba4423c39216c603858d59551d1d3ea33753cd53a4c0ed506b6052721266ffe7c0783455851d26e5b989e5576c82f9cd66fea5449f571f643e0c424449a37bf5346f3424454966018d5789086a38cacdee9dad153a0970993fe4b85860502e01a8b931096fd52c03dd4a5754ee47436574d9dca3fa03acabe0929b4137bec8f408c38b68f713d80b068c157273ac9642adbc4cce40585c9263d9a942b8ab1695bdbc2dde9ed2ff62bfc72bedad48a2cf24f7ed4ade415c73eff247335c36e8ecc3ffba4503338e11747380561640ebd6306dd213c7d7d4d2355ee08d3ef78de78f79c61df39b28e142dc2ba60face40f1859e60533dac7e9970e4faa0ff8726bdf88991c39be027e799ab338b93212221b9e029cc094b3da48a89986d05f4f5e767754964e986bae136fb502a50b8ba49707d4840b0a901b7be2a44890db4c7150ea7db32ba2ad96fcb7047209b4846bb359a20e340a18ca47c4b4b82f1b98124f6f44440dc9f5ab727df1fe7a3050b833fdaceb92efaeba44bd62d76944d96ca7b828bfd3e6c316e06bbe7f587f7dc8851a2f358f122241df229eb667f8b871a4d0d18fb971dfc8608ce9bc5673c82cfe934c1a9f760c1a1a546f55ffcbe3c7560fde3f35d0020948d764f80e8e0a4404dcca6d05dd5ed61e3573b16de9a82699e63cf2a083dcf77f5f9f22da37e6afeb58204f4804fafc011fefd02142f1767f8451d901117635bfcc0609fc9ba86563e5717beb2ab215f1d42aadb8b5995267eedc32aeaa5f13af241697ab272f863327831d21b1a154bd462cc6d1e83301436db0b346527da22db407c9af92d9f673df1218ba42e55f47fecae42a006c3fb0d61c3525fb0d9e57a01ad2d56ebfd0661cc2e804fb1a600cc4f004657918103068533109b9d467432915cf596311406a4dfcc817f34b022222b00723d474b137b93e747ef513af99692a09ee32c5a70f52e60b98290a1ead18e5490c847471e5309cbcefcc79e96472a85d9d423158a133b2d842e17be39be4199cb7d68212079045c181dde9646334a8e65d042b56e3e5b47d4bfd1640d129a257cdf0cca36c1937be224866bac42c0c9c18c311156e6dce301a5e84662707006240e5886b651d2a74af793c2789712b40eda48bc9bf3a02a409837c957190b1548f380ebefff94476b94a93e331e9ed3c73b6f74b5b2a73e38d0d3c15b17c5f17c221fdb97e0cfc4cd6bcc05ffafa3684163d2388ddb272ddc9d8d55646f027ea3224cc3547bab211816fa92ed0c1c6960ff01eb01705ec5e3c99d4504ae771a5aaa6d4612ae800286ac48947b92795babba73f270adac8737e97c05b734e225a25874415165396f4d58ed57d9c9e17607a5c3da86f911c2fab9e86bda6c74912a277afd910c9f286bf06f75c4e5a64721b349e072c37c5d5d4a31fc98601ea10df1675d027b4756dee2ac576cdbbe5f8cb961ccb36b934d7342e62810e33810c68fc8b68244cac03001d67cd3e8c000ef04a298d482f8b2f520e505a5dfc23982995cb24b0fc2ca227e67bfcf511b28c8c75e8fa171f498c7ab447940320b90f7e642d76cfad0374f50443fbe1b8865cb36a87609ef088e77688d1b13424a7ef39b08f8a76bae5218828ec857a5c88d21161abff5dcbd7d4c223c46775fc88987e42f2611dc7b832b1b93c010451b12038849d48413d00ba6a5024d046840bbfba28e6f0fe270fee6e8c3518fc8e20f7c8e457aa32d93c9beff0eee1418da27dd9936d6e10c2c325e87f06c9e7bb96a275b3b719260d9209790a081a7fff61874690e5d6c16bab44cae753b832b10bd9", "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"}) 16:16:13 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x17}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1197.924474][ T35] audit: type=1800 audit(1608048973.763:2351): pid=11559 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=858 res=0 errno=0 [ 1198.017453][T11566] device wlan1 entered promiscuous mode 16:16:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xb, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1198.132095][T11566] device wlan1 left promiscuous mode [ 1198.198835][ T35] audit: type=1800 audit(1608048973.973:2352): pid=11556 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=859 res=0 errno=0 16:16:14 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1198.273878][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:16:14 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x18}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1198.463782][ T35] audit: type=1800 audit(1608048974.313:2353): pid=11580 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=860 res=0 errno=0 16:16:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40402, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000002f00)={'wg1\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@bridge_newneigh={0x1c, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r4}}, 0x1c}}, 0x0) lstat(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$get_persistent(0x16, r5, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@local, @in=@dev={0xac, 0x14, 0x14, 0x2f}, 0x4e21, 0x5, 0x4e24, 0x0, 0x2, 0x80, 0x20, 0x5c, r4, r5}, {0x6, 0x7fff, 0x7, 0x100000000, 0x7fff, 0x3849a2e2, 0x5}, {0xf206000000000000, 0xfb7, 0x100000001, 0x4}, 0x7, 0x6e6bbb, 0x0, 0x1, 0x1, 0x3}, {{@in6=@mcast2, 0x4d2, 0x2b}, 0xa, @in6=@private0={0xfc, 0x0, [], 0x1}, 0x34ff, 0x2, 0x2, 0x3, 0x7fff, 0x5, 0xe5}}, 0xe8) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 1198.615148][ T35] audit: type=1800 audit(1608048974.463:2354): pid=11579 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=861 res=0 errno=0 [ 1198.706298][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:16:14 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xf, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1198.813929][T11568] device wlan1 entered promiscuous mode 16:16:14 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$CHAR_RAW_GETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 1199.099617][T11596] device wlan1 left promiscuous mode 16:16:15 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:15 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x1a}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:15 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000100)=@phonet, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000000200)=""/244, 0xf4}], 0x2, &(0x7f00000003c0)=""/53, 0x35}, 0x22) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) 16:16:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0x2b, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1199.490603][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1199.836561][T11598] device wlan1 entered promiscuous mode 16:16:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback, 0x1af9b8c4}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:16:15 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1200.098746][T11596] device wlan1 left promiscuous mode 16:16:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x1b}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1200.198107][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:16:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0x41, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1200.532472][ T35] kauditd_printk_skb: 4 callbacks suppressed [ 1200.532490][ T35] audit: type=1800 audit(1608048976.373:2359): pid=11625 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=866 res=0 errno=0 16:16:16 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1200.929100][T11616] device wlan1 entered promiscuous mode [ 1200.975275][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:16:16 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000100)=@phonet, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000000200)=""/244, 0xf4}], 0x2, &(0x7f00000003c0)=""/53, 0x35}, 0x22) r2 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) 16:16:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x1c}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:16 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xb6\x9cy\xab\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2z\xf6l\x10a\xb6\x92w\xc8\xe3.g\xb8\xd2\xe6\x98w\xf2`\xaf\x84MWE\x04\xd8\x1dC\xdb\xa7\x06\x0f\xa0\xfb\x88\x1d\xc9WJ\x81\'\xc0\xba^Xh\x19\xc8\x8dx/XW\xec\xef\x14:rrO\xc5\xadC\x93\x93\xc5\xdc\x84x\x92\"+\xf2\x19>\xf0\x01\x92\x9d\x1e\t\r\x99:\x04\x9f\xbf#\xbcb\xdb-B\xfcf\xea\xf7y\x17^\xab\x95\xaa\x16\x1b\x89\x14h0\xf7\xfb\xfa\xb5\x98\xbf\x8ewLd\xca\xc8\x8d\x88\x98\xbb\b\xa2\x93\x99-\x9c\xf7\xaf\xcfqc\xbf\nM\xeaZ\x06\x84\r\xe7\xe0d\b\x9b\xf4\x83A\f\x18q\xcb\x9a~\\\xf6v\xac\xff\x94\xb9\x16\x9f\x9a\xc5\x7f\xc9B\x89(7\xe9\x00\x93\xd2s\xdf\xdb\x10\x9fA\xe8\xe3?g\xaa\xcfc\xd0\x96\x8b\xa2E\x11\xaf\xeb\xa9;9\xa8\xbb\x97>\xceJx\xac\xf6l\xae=S\xb8N~\xe4\xd8o\xdf\xea\xf5b\x82\xfcB!\x11\xb5\xf4/0t4') 16:16:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_NEIGHBORS(r3, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="916ee8326c8bc4f77cba1245f2bfa2411cd8f25b15f7f11e4f3ed5a197556d59949c966183f227ed8800bd317f7b91b75170", @ANYRES16=r4, @ANYBLOB="000227bd7000fedbdf250900000005003500ff00000008002b0005000000050035000000000008002c004efbffff080032000700000008002b0006000000"], 0x44}, 0x1, 0x0, 0x0, 0x801}, 0x24004810) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) pipe(&(0x7f0000000280)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @local}, {0x2, 0x0, 0x0, @loopback}, r6}}, 0x48) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r6, 0x0, "500ea5", "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"}}, 0x110) r7 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) splice(r5, 0x0, r7, 0x0, 0x18, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000100)={@any, 0x0, 0x4, 0x942d, 0x6, 0x3, "99ccd765d786c48d104faf7306d2bd409c3cbe43495b269add867a76ba5c5eea3004c5612ff83f34c607332ec3a3687197fcbe8c961e883f4ff3cdd75d5419fd17b168844f5524a995a5e953c485bf35d7b04e4ec91ecd76d5e26a0d9692659c2d3b6e10003ed0a7da4e1345f0ba2277e571186c1607ff1866e25e6554cacb6e"}) 16:16:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1201.283486][ T35] audit: type=1800 audit(1608048977.073:2360): pid=11644 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=868 res=0 errno=0 [ 1201.418268][ T35] audit: type=1800 audit(1608048977.263:2361): pid=11642 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=869 res=0 errno=0 [ 1201.507717][T11656] device wlan1 left promiscuous mode 16:16:17 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:16:17 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x1d}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1201.873207][T10574] usb 3-1: new high-speed USB device number 49 using dummy_hcd [ 1201.984032][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:16:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1202.413836][T10574] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1202.462589][T10574] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1202.483656][ T35] audit: type=1800 audit(1608048978.323:2362): pid=11673 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=870 res=0 errno=0 16:16:18 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e24, 0x101, @loopback, 0x9}, 0x1c) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 16:16:18 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1202.517860][ T35] audit: type=1800 audit(1608048978.363:2363): pid=11668 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=871 res=0 errno=0 [ 1202.548584][T10574] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 16:16:18 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x1e}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1202.619845][T10574] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1202.665917][T10574] usb 3-1: config 0 descriptor?? [ 1202.764028][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1202.850414][T11688] device wlan1 entered promiscuous mode [ 1203.100821][ T35] audit: type=1800 audit(1608048978.833:2364): pid=11687 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=872 res=0 errno=0 [ 1203.175455][T11688] device wlan1 left promiscuous mode [ 1203.219329][ T35] audit: type=1800 audit(1608048979.063:2365): pid=11684 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=873 res=0 errno=0 [ 1203.355278][T10574] saitek 0003:06A3:0621.0013: item fetching failed at offset 0/1 [ 1203.380883][T10574] saitek 0003:06A3:0621.0013: parse failed [ 1203.420396][T10574] saitek: probe of 0003:06A3:0621.0013 failed with error -22 16:16:20 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) socket$kcm(0x29, 0x2, 0x0) r1 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io$hid(r1, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) 16:16:20 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x21}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:20 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 16:16:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x1ec12b33) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$kcm(0xa, 0x2, 0x11) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000440)='devlink\x00') sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r3, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000640)={&(0x7f00000004c0)={0x168, r5, 0x100, 0x70bd26, 0x25dfdbff, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x7}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x7}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x4ebabf15}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x8}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x95e}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x6}}]}, 0x168}, 0x1, 0x0, 0x0, 0x40}, 0x20004815) setsockopt$sock_attach_bpf(r4, 0x88, 0x67, &(0x7f0000000040)=r4, 0x4) sendmsg$kcm(r4, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) recvmsg(r4, &(0x7f00000003c0)={&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000180)=""/222, 0xde}, {&(0x7f00000002c0)=""/106, 0x6a}, {&(0x7f0000000340)=""/91, 0x5b}], 0x3}, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000000700)={0x6, 0x0, &(0x7f00000006c0)=[r4, r3, r0, 0xffffffffffffffff]}, 0x4) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:16:20 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1204.582569][T19185] usb 3-1: USB disconnect, device number 49 [ 1204.669006][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1204.678746][T11716] device wlan1 entered promiscuous mode [ 1204.777892][ T35] audit: type=1800 audit(1608048980.623:2366): pid=11724 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=874 res=0 errno=0 [ 1204.887932][ T35] audit: type=1800 audit(1608048980.693:2367): pid=11724 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=875 res=0 errno=0 [ 1204.910120][T11716] device wlan1 left promiscuous mode 16:16:20 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:21 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x23}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1205.343515][ T35] audit: type=1800 audit(1608048981.133:2368): pid=11736 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=876 res=0 errno=0 [ 1205.493209][T19185] usb 3-1: new high-speed USB device number 50 using dummy_hcd [ 1205.541100][ T35] audit: type=1800 audit(1608048981.383:2369): pid=11734 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=877 res=0 errno=0 16:16:21 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x3010, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:16:21 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x25}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1205.950134][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1206.218134][ T35] audit: type=1800 audit(1608048982.063:2370): pid=11757 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=878 res=0 errno=0 [ 1206.264072][T19185] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1206.285844][T19185] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1206.309400][T19185] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 [ 1206.323572][T19185] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1206.361025][T19185] usb 3-1: config 0 descriptor?? [ 1206.369447][ T35] audit: type=1800 audit(1608048982.213:2371): pid=11747 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=879 res=0 errno=0 [ 1206.885537][T19185] saitek 0003:06A3:0621.0014: item fetching failed at offset 0/1 [ 1206.894550][T19185] saitek 0003:06A3:0621.0014: parse failed [ 1206.900522][T19185] saitek: probe of 0003:06A3:0621.0014 failed with error -22 [ 1207.092237][T19185] usb 3-1: USB disconnect, device number 50 16:16:23 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) socket$kcm(0x29, 0x2, 0x0) r1 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io$hid(r1, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) 16:16:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:16:23 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x26}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:23 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x86802, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000001c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4o\xc5KW\xc4\xdd`\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r3, &(0x7f0000000080)={0x18}, 0x75) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000024c0)="b9800000c03500400000665c0f5d0202f5fbfb20e035c5e17de74b064000c4635765f766400fc774a600f30fbcf726660f38807769653626400fc7bb00000000360f7955f49af342d8868680000049b8206bc3c3220d2d4f5d2e66420fc73366bab6200000", 0x65}], 0x1, 0x0, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$KVM_SET_NESTED_STATE(r6, 0x4080aebf, &(0x7f0000000280)={{0x0, 0x0, 0x80}, "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", "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"}) ioctl$KVM_RUN(r6, 0xae80, 0x0) shmat(0x0, &(0x7f0000001000/0x1000)=nil, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) 16:16:23 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xe, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 1207.700923][T11787] device wlan1 entered promiscuous mode [ 1207.726744][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1207.897383][ T35] audit: type=1800 audit(1608048983.743:2372): pid=11794 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=880 res=0 errno=0 16:16:23 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x27}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1208.086985][ T35] audit: type=1800 audit(1608048983.933:2373): pid=11784 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=881 res=0 errno=0 [ 1208.158405][T11787] device wlan1 left promiscuous mode [ 1208.203284][T19185] usb 3-1: new high-speed USB device number 51 using dummy_hcd 16:16:24 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xf, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:24 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x28}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1208.489832][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:16:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1208.593834][T19185] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1208.623405][T19185] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1208.679820][T19185] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 16:16:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000080)={0x18}, 0x75) getsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x4) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 1208.741436][ T35] audit: type=1800 audit(1608048984.583:2374): pid=11817 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=882 res=0 errno=0 [ 1208.785582][T19185] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1208.833786][T19185] usb 3-1: config 0 descriptor?? [ 1208.849022][ T35] audit: type=1800 audit(1608048984.693:2375): pid=11818 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=883 res=0 errno=0 [ 1208.864425][T11793] device wlan1 entered promiscuous mode 16:16:24 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1208.951714][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1209.367636][ T35] audit: type=1800 audit(1608048985.213:2376): pid=11833 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=884 res=0 errno=0 [ 1209.488793][T19185] saitek 0003:06A3:0621.0015: item fetching failed at offset 0/1 [ 1209.497242][T19185] saitek 0003:06A3:0621.0015: parse failed [ 1209.503372][T19185] saitek: probe of 0003:06A3:0621.0015 failed with error -22 [ 1209.536627][ T35] audit: type=1800 audit(1608048985.383:2377): pid=11833 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=885 res=0 errno=0 [ 1209.691874][T10579] usb 3-1: USB disconnect, device number 51 [ 1209.744205][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:16:26 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x29}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:26 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8A\x83u<\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\x10k\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\x00\x00\x00\x00\x00\x00\x00\x00\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 16:16:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:16:26 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x11, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f00000002c0)) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r3 = accept(r1, &(0x7f0000000100)=@x25, &(0x7f0000000000)=0x80) sendto$inet6(r3, &(0x7f0000000180)="172a4db32a5d01f6e9bb20251714ec69a82079af45c1acbdc9364d06d7fcd464f914a7c0ac4d8bfb22cdfa0b05382a174ba4157daa885fc78621a768a15238523b2259ba24b2d42a3a28d19fef5f64a696be3bc5dc0f052ef317decf3e7992fa219fb9a834275f3c6232c9544d9d82a8b9bdbd63feddca07197b0f5012b9802ab2388dede5d43530ad7223288b383698e968012a29e7bd546dc31f49780d241cd13e59d8474715d1ea9350c54e1c40cba03571e30de382f99fe15c5308babd06", 0xc0, 0x4000000, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 16:16:26 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') sendmsg(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="84d45446ec85fe0bc1b0fb8503c4ae966daca4b12c23230aeae57648f7235ee9c67e53e817693fa92e7eb66d4605d1bdade7daf000d7585852e2f7a23a450d6b1c5a3290ddd48a28442da2bc1de3fb0e2f", 0x51}, {&(0x7f0000000600)="487cfe360aa94253677ec9fef2235d51ba2ef78b9ec7865b8b71897deb2ddbac70facc57cca30cf5026101b3664dc1b6d9712c530c5574cf174993541ff149b7f1c56698c7bf1d9341ad30e40ac1bbb6819a0d82268807a00ad8aab26a956bd07c867367342a64994f6c1d6b998a3a4d86badc9a73ad71691ebabc95f329f6e4f14cf82bf2257ce9e96efdd2aa106b70a83bd90bc40ad0f7592f55483f921dd56e5e139a98754c6591f5b38e5e61c50410926a47162347554bdd5878af500814b3e58caf5114378ddfe8433c2db59f86823c37c8b7ae05eb88905823314aaa0d85ad9a04499e55b6911aae6437ee019d8e96e094e5", 0xf5}, {&(0x7f0000000700)="c56dd6b1358ed0c33be41f48d0c75544418f3764c723a0036cfad9a5beea2404f39a6f4e317b45067ddd1752b5c06b95595a8d19774460d8559238725d55702d2ef542b859e24ea550c663c66e1b2df9821d0e9a603291658cf10239d53ad0d00abbe58aa3b291ae0713b9c61e6ac402e39391e74f55defa1470fa64ef693d193161c9a92cf1bc16e5e4a7f6b5bb865788111ed13ee5e3b9656143aa2b09cbdf5fa26d12b25b130ad6cd3a249e66f99cbd8544aed824a725b33b22d250a627fb73", 0xc1}], 0x3, &(0x7f0000000800)=[{0xa8, 0x11, 0x6, "0f11b05fb68f1cf57d355f5bc03933a640b8f1207927108d49526763ad4346f6313b7d85d6d3e26abd7889806887b13fc76d2b1d1465e7dafc6c37a576accfce4358bc46be5a868ad4bc4839f0e1f9cc4d5908ef26a4116cd4cd278f05c38a35331b27518335cc85635c70bd8745d16b2eb29a2a183a00513561afaeeb8a5554f8aa733c605e138c722b7adaeea7f310d84adc7e2b3ef0"}, {0x60, 0xc, 0x8000, "746d107c142a014ef4e1c8c708fc5e3f7a32152ff6eea895881137b44b298b9da01c663ec3889dd57eccf90b69499c0c8c8f8777d36d1295a5e34f60aca50704756837af4344f524ab27a257fcb540"}, {0x38, 0x101, 0x7, "2d409af2b4002dcb6cf5aab913da6f825887b35eb08f2927eff224377cfef28d416f72"}, {0x18, 0x115, 0x2, "fd"}, {0xf0, 0x10e, 0x4, "0dffa2ec8ccf17238f3615be6eab8e9e88a1d5e942f5315a2c414c2c535ab1f257095e57bc729020bcac8075b5807792e90a0ac2d0e32622bfcc488e4f2902efc3f79042d0450016bd1849ee96ece34fae109923be6f495519da13e3f261913f94d5bb30e6f7081b81d3be22eb53f3078229f4515418f9391fa9018688c1750257e02d53251d782a8c34bcea6f114594f95bebd7a6d079220dbbafb6c77155ee29c68006ce463919a7c8721a2a2a641b19a85ea96dcb71a8eb97064f8604223e0995a68b92c039ce71d8313a547bf9dd75cccb23f655790b893fea3e338f9d"}, {0x100, 0x116, 0x6, "cc9401a47f4b87d4bfc7650ed847b2ac10af81a73a0e25f368f96f6ba725f91814529138b627152fb325e72f24de28d3eeeda5db6429c4fee3620f1de835e94b4dbb733de1a3035abbb7a29db3a3cb9d41825358203eef1c6972927410ab934ddce0ae762a266e26686d3c129e8859d204d6a47420c1a098e8017a1d8bbda25d0800b8f45e365f6723da7fba1b2a2443d357f4ef70b750783fb03922c046acd44ac13b86d9f6d7b205cbb8a97a15239ec8951bfdfb84700ed44a93cbb6a8c4ff8ce6eea703992fd0b3ee8deae6d472687b824ac82c2eb0f81848b6381291c01c58a88264b1067032ea5e6d938e1f79"}, {0x90, 0x6, 0x800, "6f20e017aca5a62901bc2c724b0dc9d16bfc59371c7f540cd51292e02db70f2812b4e04b2714475ec5eb2f32d11a0a506c21e79c62a93cdccefe460f385cf4bfdae3240cf440e4985eee3e9846566b156ecd785f113a3fdfabb9df96909b2a29efb3a22e35701098b958616bc6b984739072b503f52c8853752309336dc855"}, {0x60, 0x100, 0x2, "02be49416ed143704ee5eae3a9355412a5518d68c67b97f14a3ce6d0c3480d756603a05a8301811d49e305781cd9116588c8b9ce42479cfda990d33be7b62b08e14b3281a8f80903140bc19e136fd8"}], 0x438}, 0x1) r1 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io$hid(r1, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) [ 1210.262721][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1210.454120][T11862] device wlan1 left promiscuous mode [ 1210.519221][ T35] audit: type=1800 audit(1608048986.363:2378): pid=11871 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=886 res=0 errno=0 16:16:26 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x48, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1210.606105][ T35] audit: type=1800 audit(1608048986.403:2379): pid=11871 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=887 res=0 errno=0 16:16:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:16:26 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x2a}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1210.837915][ T35] audit: type=1800 audit(1608048986.683:2380): pid=11887 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=888 res=0 errno=0 [ 1210.858147][T10579] usb 3-1: new high-speed USB device number 52 using dummy_hcd [ 1210.983461][T11867] device wlan1 entered promiscuous mode [ 1211.176052][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1211.202898][T11862] device wlan1 left promiscuous mode [ 1211.236039][ T35] audit: type=1800 audit(1608048987.083:2381): pid=11887 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=889 res=0 errno=0 16:16:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4c, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:16:27 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x2b}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1211.434344][T10579] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1211.479666][T10579] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1211.511457][ T35] audit: type=1800 audit(1608048987.353:2382): pid=11900 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=890 res=0 errno=0 [ 1211.573245][T10579] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 16:16:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x66, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1211.607686][ T35] audit: type=1800 audit(1608048987.393:2383): pid=11895 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=891 res=0 errno=0 [ 1211.640489][T10579] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1211.714273][T10579] usb 3-1: config 0 descriptor?? [ 1211.948217][ T35] audit: type=1800 audit(1608048987.793:2384): pid=11910 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=892 res=0 errno=0 16:16:27 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000080)={0x18}, 0x75) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r2 = socket$inet_smc(0x2b, 0x1, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000180)=0x4) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000001c0), &(0x7f0000000200)=0x40) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_WRITE={0x17, 0x5, 0x4007, @fd=r2, 0x9, &(0x7f0000000000)="cf0f297fbcfbe2aec08695a3cf7604281af481dd6e5cfaf8ebf17c44569e13d8a7487c3806f92dfa285bd4a1e1c6762d664b8f1dddfc29cbe7322722fd710f5063f1a92d95ebb58cae678e62d5c26b58b15cd7af503867d993a9", 0x5a, 0xf, 0x0, {0x0, r3}}, 0x63) r4 = socket$kcm(0x29, 0x5, 0x0) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x2000, 0x0) ioctl$VFIO_GET_API_VERSION(r5, 0x3b64) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 16:16:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:16:27 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x2c}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000340)={0x0, {}, 0x0, {}, 0x3, 0x0, 0x9, 0x10, "71c91167198f341b89822f308b2599f8b07b4dfcfc33b52b00e5a6c67b775483780576d1fe742a131d8ad3f1edff72cacdfb22dee182c69ad297e2b32cceee6c", "2dcfa15764d8151251e9e63cd3befad9630e7dc81f8a250a9bfe16e92c592016", [0x7, 0x80]}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x40) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendmsg$DCCPDIAG_GETSOCK(r4, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4084000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="480100001300000225bd7000fcdbdf25230899e14e234e2300800000220a0000020000009100000001000000050000000200000000000080", @ANYRES32=0x0, @ANYBLOB="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"], 0x148}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 1212.045530][ T35] audit: type=1800 audit(1608048987.863:2385): pid=11910 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=893 res=0 errno=0 [ 1212.368748][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1212.405196][T10579] saitek 0003:06A3:0621.0016: item fetching failed at offset 0/1 [ 1212.423564][T10579] saitek 0003:06A3:0621.0016: parse failed [ 1212.429540][T10579] saitek: probe of 0003:06A3:0621.0016 failed with error -22 [ 1212.482660][T11927] device wlan1 entered promiscuous mode [ 1212.500298][T11927] device wlan1 left promiscuous mode [ 1212.604257][ T9821] usb 3-1: USB disconnect, device number 52 [ 1212.715567][T11929] device wlan1 entered promiscuous mode 16:16:28 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io$hid(r1, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) 16:16:29 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x2d}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:29 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x68, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:16:29 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 16:16:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@mcast1, @in=@private}}, {{@in=@dev}, 0x0, @in=@private}}, &(0x7f0000000000)=0xe8) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x16, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000200), 0x4) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "47285e76cd38b8ca", "048b9bbf9af8f6ac9dc695fa831cd262", "ccb3014c", "5500005bac2a0640"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 1213.218608][T11948] device wlan1 left promiscuous mode [ 1213.235822][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1213.499141][ T35] audit: type=1800 audit(1608048989.343:2386): pid=11961 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=894 res=0 errno=0 16:16:29 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x2e}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1213.783311][ T35] audit: type=1800 audit(1608048989.623:2387): pid=11946 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=895 res=0 errno=0 16:16:29 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6c, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1214.013510][T19185] usb 3-1: new high-speed USB device number 53 using dummy_hcd 16:16:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:16:30 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x2f}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1214.200869][ T35] audit: type=1800 audit(1608048990.043:2388): pid=11978 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=896 res=0 errno=0 16:16:30 executing program 4: r0 = socket(0x10, 0x2, 0x2) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 16:16:30 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r0}) mq_getsetattr(r1, &(0x7f00000000c0)={0x4, 0x1, 0x150}, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 1214.608109][T11984] device wlan1 entered promiscuous mode [ 1214.656603][T11984] device wlan1 left promiscuous mode [ 1214.753817][T19185] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1214.776937][T19185] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1214.831063][T19185] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 [ 1214.856983][T19185] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1214.897900][T19185] usb 3-1: config 0 descriptor?? [ 1215.395332][T19185] saitek 0003:06A3:0621.0017: item fetching failed at offset 0/1 [ 1215.403612][T19185] saitek 0003:06A3:0621.0017: parse failed [ 1215.409687][T19185] saitek: probe of 0003:06A3:0621.0017 failed with error -22 [ 1215.606546][T22394] usb 3-1: USB disconnect, device number 53 16:16:31 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x74, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:31 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x2, &(0x7f0000000540)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50004}]}) 16:16:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:16:31 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x30}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:31 executing program 1: socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)='wlan1\x00\x1bygc\x99\xc3i\xf1\x1a\xec\xd2\x00\xff\xc3\x87\xe2\xa3\x80\x8a\xb2L\x06\xb5\x12\x03F\xd9\x1f\xff\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdfj\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2L\x15\x1b\x90\x0f\xa0\xe9\xd0f\xcb\xe8oOA\x00\x00') ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f0000000140)={0x3, 0xffffffae}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f00000001c0)={0x5, 0x3, 0x80, 0x10000, 0x1, [0x0, 0x1, 0x44], [0x1, 0x4, 0x7, 0x3], [0x1, 0x0, 0x27, 0xf6e], [0x200, 0x25, 0x7fffffff, 0x9]}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000240), &(0x7f00000002c0)=0x4) splice(r0, 0x0, r2, 0x0, 0x18, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000000)={0xa, {0x3, 0x8, 0x8}}, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 16:16:31 executing program 2: socket$kcm(0x29, 0x5, 0x0) r0 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) [ 1216.232640][ T35] kauditd_printk_skb: 1 callbacks suppressed [ 1216.232657][ T35] audit: type=1800 audit(1608048992.073:2390): pid=12022 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=898 res=0 errno=0 16:16:32 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7a, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:32 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_INTERFACE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, 0x0, 0x604, 0x7, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x9, 0x2f}}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000800}, 0xda95c47f51eb2279) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000000)) 16:16:32 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x31}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1216.661973][ T35] audit: type=1800 audit(1608048992.293:2391): pid=12018 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=899 res=0 errno=0 [ 1216.706291][T12034] device wlan1 entered promiscuous mode 16:16:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1216.750274][T12034] device wlan1 left promiscuous mode [ 1216.763946][T10574] usb 3-1: new high-speed USB device number 54 using dummy_hcd [ 1217.020403][ T35] audit: type=1326 audit(1608048992.433:2392): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12015 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x50000 16:16:33 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x32}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:33 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x200000}]}) [ 1217.171528][T10574] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1217.199182][ T35] audit: type=1326 audit(1608048992.433:2393): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12015 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4179f1 code=0x50000 16:16:33 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xff, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1217.249779][T10574] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1217.295694][T10574] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 [ 1217.327738][ T35] audit: type=1326 audit(1608048992.433:2394): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12015 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4179f1 code=0x50000 [ 1217.363360][T10574] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1217.410177][ T35] audit: type=1326 audit(1608048992.433:2395): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12015 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=231 compat=0 ip=0x45e159 code=0x50000 [ 1217.419657][T10574] usb 3-1: config 0 descriptor?? [ 1217.478487][ T35] audit: type=1800 audit(1608048992.673:2396): pid=12041 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=900 res=0 errno=0 [ 1217.503302][T12037] device wlan1 entered promiscuous mode 16:16:33 executing program 1: ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000340)=""/103) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xbb\xf2{\x80c\a\xee\x8e\x1e\xc4\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xaa\xe6\xc4\xc4\xa9\xf5\xd5\xb1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r1 = socket$kcm(0x29, 0x2, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x5, 0x200) ioctl$SG_GET_REQUEST_TABLE(r2, 0x2286, &(0x7f00000001c0)) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 16:16:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1217.576159][ T35] audit: type=1326 audit(1608048992.843:2397): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12015 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x50000 [ 1217.717094][ T35] audit: type=1326 audit(1608048992.843:2398): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12015 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4179f1 code=0x50000 16:16:33 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1217.914606][ T35] audit: type=1326 audit(1608048992.843:2399): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12015 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=1 compat=0 ip=0x4179f1 code=0x50000 16:16:33 executing program 4: bpf$ITER_CREATE(0x3, 0x0, 0x13b) [ 1218.226595][T10574] saitek 0003:06A3:0621.0018: item fetching failed at offset 0/1 [ 1218.234951][T10574] saitek 0003:06A3:0621.0018: parse failed [ 1218.241077][T10574] saitek: probe of 0003:06A3:0621.0018 failed with error -22 [ 1218.421855][T10574] usb 3-1: USB disconnect, device number 54 16:16:34 executing program 2: socket$kcm(0x29, 0x5, 0x0) r0 = syz_usb_connect$hid(0x0, 0x92, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x6a3, 0x621, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x0, "b20efbff"}]}}, 0x0}, 0x0) 16:16:34 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 16:16:34 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) syz_usbip_server_init(0x5) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r3, 0x0, 0x18, 0x0) ioctl$TIOCSTI(r1, 0x5412, 0x942f) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r4 = accept$inet6(r2, 0x0, &(0x7f00000001c0)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000003c0)="53a6be5958b644d0bd90d8f4e9fd14d674d42dc3b1afc17ec263ca7058b76bb45847b1b0c99683a76802a36b98b4859b9aaa38a83f55061c8de5a35c7cac277cdd2ea07911767d9a0614c5baee220be90600e1023938cc0aee274c51ed2a3f17ce564a86e2cbb1a29efa801742fc7ab2184115fd1b530c164f4ea8ef1a6bb0f1ecd74ab66f97125c184ebb243721e5d1e3caf198197f5a126139261137d28e58329eaf581b81c4d73302bac4939ef587253f507f8b2ff59cac19b8fdb16720e80d38158903fae36bc6", 0xc9, r4}, 0x68) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xcd%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|cL\xe9\xd9;\x13\xff\x7f\x00\x00\x00\x00\x00\x00\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OAr\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xffw9P\xee\x8aG\xdd2\x00'/105) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cachefiles\x00', 0x410100, 0x0) ioctl$VT_RESIZE(r6, 0x5609, &(0x7f0000000300)={0x0, 0x7, 0x78e1}) sendmsg$IPSET_CMD_DESTROY(r6, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000040)={0x30, 0x3, 0x6, 0x3, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x4000000) 16:16:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:16:34 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x33}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:16:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) [ 1219.011234][T12108] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(4) [ 1219.018231][T12108] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 16:16:35 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x2, &(0x7f0000000540)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) prctl$PR_SET_ENDIAN(0x14, 0x0) [ 1219.204671][T12111] device wlan1 left promiscuous mode [ 1219.413502][T10579] usb 12-1: SetAddress Request (2) to port 0 [ 1219.420538][T22394] usb 3-1: new high-speed USB device number 55 using dummy_hcd 16:16:35 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x500, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x189f}, 0x4, 0x100000001, 0x4, 0x0, 0x2, 0xd7e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, r0) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) [ 1219.462796][T10579] usb 12-1: new SuperSpeed Gen 1 USB device number 2 using vhci_hcd 16:16:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x0, 0x100000000000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x41}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 16:16:35 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x4c, 0x12, 0x1}, 0x4c}}, 0x0) 16:16:35 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = getpgid(0x0) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext, 0x4a000, 0x0, 0x0, 0x6, 0x100000000000000, 0xfffffffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x7, 0x0, 0x80, 0x0, 0x0, 0x500, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x400, 0x189f}, 0x4, 0x100000001, 0x4, 0x8, 0x2, 0xd7e2, 0xb2}, r3, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x11], 0x0}, 0x35}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close_range(0xffffffffffffffff, r0, 0x0) r5 = dup2(r4, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x20, 0x0, 0x0, 0x338, 0x1}, 0x14) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) [ 1219.825398][T12114] vhci_hcd: connection reset by peer [ 1219.837355][ T202] vhci_hcd: stop threads [ 1219.845400][ T202] vhci_hcd: release socket [ 1220.006155][ T202] vhci_hcd: disconnect device 16:16:35 executing program 4: bpf$ITER_CREATE(0x3, 0x0, 0x10) [ 1220.059416][T12108] device wlan1 entered promiscuous mode [ 1220.133452][T22394] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1220.144727][T22394] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1220.162446][T22394] usb 3-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.40 [ 1220.171908][T22394] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1220.183333][T22394] usb 3-1: config 0 descriptor?? [ 1220.396899][T12108] vhci_hcd vhci_hcd.0: pdev(1) rhport(1) sockfd(7) [ 1220.403468][T12108] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 1220.415234][T12125] device wlan1 left promiscuous mode [ 1220.455059][T12148] vhci_hcd: connection closed [ 1220.465105][ T21] ================================================================== [ 1220.478173][ T21] BUG: KASAN: null-ptr-deref in kthread_stop+0x90/0x720 [ 1220.485119][ T21] Write of size 4 at addr 0000000000000024 by task kworker/u4:1/21 [ 1220.494108][ T21] [ 1220.496475][ T21] CPU: 1 PID: 21 Comm: kworker/u4:1 Not tainted 5.10.0-syzkaller #0 [ 1220.504454][ T21] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1220.514543][ T21] Workqueue: usbip_event event_handler [ 1220.520015][ T21] Call Trace: [ 1220.523441][ T21] dump_stack+0x107/0x163 [ 1220.528153][ T21] ? kthread_stop+0x90/0x720 [ 1220.532761][ T21] ? kthread_stop+0x90/0x720 [ 1220.537452][ T21] kasan_report.cold+0x5/0x37 [ 1220.542147][ T21] ? kthread_stop+0x90/0x720 [ 1220.546766][ T21] check_memory_region+0x13d/0x180 [ 1220.551922][ T21] kthread_stop+0x90/0x720 [ 1220.556373][ T21] vhci_shutdown_connection+0x17f/0x340 [ 1220.561933][ T21] ? event_handler+0x14c/0x4f0 [ 1220.567380][ T21] ? kfree+0xdb/0x360 [ 1220.571898][ T21] event_handler+0x1f0/0x4f0 [ 1220.576509][ T21] process_one_work+0x933/0x15a0 [ 1220.581463][ T21] ? lock_release+0x710/0x710 [ 1220.586145][ T21] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1220.591923][ T21] ? rwlock_bug.part.0+0x90/0x90 [ 1220.596877][ T21] ? _raw_spin_lock_irq+0x41/0x50 [ 1220.601919][ T21] worker_thread+0x64c/0x1120 [ 1220.606632][ T21] ? process_one_work+0x15a0/0x15a0 [ 1220.612187][ T21] kthread+0x3b1/0x4a0 [ 1220.616284][ T21] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 1220.622198][ T21] ret_from_fork+0x1f/0x30 [ 1220.627153][ T21] ================================================================== [ 1220.635222][ T21] Disabling lock debugging due to kernel taint [ 1220.655407][T22394] saitek 0003:06A3:0621.0019: item fetching failed at offset 0/1 [ 1220.669468][T22394] saitek 0003:06A3:0621.0019: parse failed [ 1220.684531][T22394] saitek: probe of 0003:06A3:0621.0019 failed with error -22 [ 1220.699416][T12111] device wlan1 entered promiscuous mode [ 1220.723648][ T21] Kernel panic - not syncing: panic_on_warn set ... [ 1220.733295][ T21] CPU: 1 PID: 21 Comm: kworker/u4:1 Tainted: G B 5.10.0-syzkaller #0 [ 1220.742705][ T21] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1220.754014][ T21] Workqueue: usbip_event event_handler [ 1220.760500][ T21] Call Trace: [ 1220.764598][ T21] dump_stack+0x107/0x163 [ 1220.769494][ T21] ? kthread_associate_blkcg+0x6a0/0x700 [ 1220.775138][ T21] panic+0x306/0x73d [ 1220.779484][ T21] ? __warn_printk+0xf3/0xf3 [ 1220.784342][ T21] ? preempt_schedule_common+0x59/0xc0 [ 1220.790613][ T21] ? kthread_stop+0x90/0x720 [ 1220.795211][ T21] ? preempt_schedule_thunk+0x16/0x18 [ 1220.800613][ T21] ? trace_hardirqs_on+0x51/0x1c0 [ 1220.809241][ T21] ? kthread_stop+0x90/0x720 [ 1220.813838][ T21] ? kthread_stop+0x90/0x720 [ 1220.818751][ T21] end_report+0x58/0x5e [ 1220.824235][ T21] kasan_report.cold+0xd/0x37 [ 1220.829912][ T21] ? kthread_stop+0x90/0x720 [ 1220.834568][ T21] check_memory_region+0x13d/0x180 [ 1220.843221][ T21] kthread_stop+0x90/0x720 [ 1220.847798][ T21] vhci_shutdown_connection+0x17f/0x340 [ 1220.854287][ T21] ? event_handler+0x14c/0x4f0 [ 1220.860726][ T21] ? kfree+0xdb/0x360 [ 1220.865163][ T21] event_handler+0x1f0/0x4f0 [ 1220.869760][ T21] process_one_work+0x933/0x15a0 [ 1220.878270][ T21] ? lock_release+0x710/0x710 [ 1220.882955][ T21] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1220.891553][ T21] ? rwlock_bug.part.0+0x90/0x90 [ 1220.897338][ T21] ? _raw_spin_lock_irq+0x41/0x50 [ 1220.903653][ T21] worker_thread+0x64c/0x1120 [ 1220.911729][ T21] ? process_one_work+0x15a0/0x15a0 [ 1220.919476][ T21] kthread+0x3b1/0x4a0 [ 1220.923888][ T21] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 1220.932793][ T21] ret_from_fork+0x1f/0x30 [ 1220.937976][ T21] Kernel Offset: disabled [ 1220.942295][ T21] Rebooting in 86400 seconds..