x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0), 0x0) 17:13:22 executing program 7: pipe2(&(0x7f00000000c0), 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x1ff) 17:13:22 executing program 5: 17:13:22 executing program 3: 17:13:22 executing program 1: 17:13:22 executing program 6: 17:13:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000100)) 17:13:22 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) clone(0x0, &(0x7f0000000380), &(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000480)) 17:13:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000180)) [ 119.591408] audit: type=1326 audit(1529687602.590:76): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8523 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getgid() process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:22 executing program 7: pipe2(&(0x7f00000000c0), 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x1ff) 17:13:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) 17:13:22 executing program 7: pipe2(&(0x7f00000000c0), 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x1ff) 17:13:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000040)) 17:13:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getgid() process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) 17:13:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) 17:13:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:23 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) pipe2(&(0x7f00000000c0), 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x1ff) 17:13:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0), 0x0) 17:13:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) [ 120.578918] audit: type=1326 audit(1529687603.577:77): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8581 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:23 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) pipe2(&(0x7f00000000c0), 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x1ff) 17:13:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getgid() process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) 17:13:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000300)={0x0, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/206, &(0x7f0000000000)=0xce) 17:13:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) 17:13:23 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) pipe2(&(0x7f00000000c0), 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x1ff) 17:13:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getgid() process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f00000000c0), 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x1ff) 17:13:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) 17:13:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) 17:13:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000003680)=0xc) munlockall() 17:13:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50003}]}) unlink(&(0x7f0000000000)='./file0\x00') fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 17:13:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f00000000c0), 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x1ff) 17:13:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) 17:13:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) 17:13:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) rt_sigsuspend(&(0x7f0000000240), 0x8) 17:13:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f00000000c0), 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x1ff) 17:13:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) accept4(0xffffffffffffff9c, &(0x7f0000000000)=@nl=@unspec, &(0x7f0000000080)=0x80, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 17:13:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) 17:13:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) 17:13:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) 17:13:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) pipe2(&(0x7f00000000c0), 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x1ff) 17:13:25 executing program 1: getgid() process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:25 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000940)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:13:25 executing program 0: socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) 17:13:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) 17:13:25 executing program 1: getgid() process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) pipe2(&(0x7f00000000c0), 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x1ff) 17:13:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:25 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 17:13:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) 17:13:25 executing program 1: getgid() process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000940)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:13:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:25 executing program 0: socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) 17:13:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) pipe2(&(0x7f00000000c0), 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x1ff) 17:13:25 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:25 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getgid() process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:25 executing program 3: sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) 17:13:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000180)) 17:13:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f00000000c0), 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x1ff) 17:13:25 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:25 executing program 0: socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) 17:13:25 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000940)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:13:26 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getgid() process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:26 executing program 3: sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) [ 123.038228] audit: type=1326 audit(1529687606.036:78): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8760 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:26 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:26 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:26 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getgid() process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) get_robust_list(0x0, &(0x7f00000002c0)=&(0x7f0000000280)={&(0x7f00000001c0)={&(0x7f0000000180)}, 0x0, &(0x7f0000000240)={&(0x7f0000000200)}}, &(0x7f0000000300)=0x18) 17:13:26 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) 17:13:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000940)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:13:26 executing program 3: sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) 17:13:26 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:26 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f00000000c0), 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x1ff) 17:13:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getgid() process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) 17:13:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000940)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:13:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:26 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) 17:13:27 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) [ 123.999714] audit: type=1326 audit(1529687606.998:79): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8821 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getgid() process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:27 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) 17:13:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000940)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:13:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) 17:13:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:27 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000940)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:13:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:27 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) 17:13:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f00000000c0), 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x1ff) 17:13:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getgid() process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) [ 124.972828] audit: type=1326 audit(1529687607.971:80): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8887 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) 17:13:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50002}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getgid() process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:28 executing program 6: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000940)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:13:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) 17:13:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) 17:13:28 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000940)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:13:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50002}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getgid() process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) 17:13:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) 17:13:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_open_dev$mice(&(0x7f0000000540)='/dev/input/mice\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f0000000700)='/dev/urandom\x00', 0x0, 0x0) 17:13:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000940)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:13:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getgid() process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) 17:13:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50002}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50002}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) 17:13:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) 17:13:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50000}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000940)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:13:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) 17:13:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getgid() process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50002}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) [ 126.403515] audit: type=1326 audit(1529687609.402:81): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8982 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000940)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:13:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) [ 126.521280] audit: type=1326 audit(1529687609.434:82): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8988 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000002c00)=@broute={'broute\x00', 0x20, 0x6, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200036c0], 0x0, &(0x7f00000000c0), &(0x7f00000036c0)=[{0x0, '\x00', 0x2}, {0x0, '\x00', 0x3}, {0x0, '\x00', 0x5}]}, 0x108) 17:13:29 executing program 2: eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50002}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) 17:13:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) [ 126.691251] audit: type=1326 audit(1529687609.573:83): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9000 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 126.710828] audit: type=1326 audit(1529687609.630:84): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9004 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:29 executing program 2: eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:29 executing program 2: eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) [ 126.852371] audit: type=1326 audit(1529687609.850:85): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9023 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:29 executing program 7: 17:13:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) [ 127.016626] audit: type=1326 audit(1529687610.015:86): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9034 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getgid() process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:30 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:30 executing program 7: [ 127.307592] audit: type=1326 audit(1529687610.306:87): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9040 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 127.398528] audit: type=1326 audit(1529687610.396:88): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9048 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:30 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:30 executing program 7: 17:13:30 executing program 6: 17:13:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:30 executing program 6: 17:13:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) 17:13:30 executing program 7: 17:13:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:30 executing program 6: 17:13:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:30 executing program 7: 17:13:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "2e783da88f8c426c64c9f3b12986d7ba7746fa41c1358982b2ce2a2a0c28ce9e"}) 17:13:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getgid() process_vm_writev(0x0, &(0x7f0000000340), 0x0, &(0x7f0000002880), 0x0, 0x0) 17:13:31 executing program 7: 17:13:31 executing program 6: 17:13:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='threaded\x00', 0xffffffec) 17:13:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) 17:13:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:31 executing program 7: 17:13:31 executing program 6: 17:13:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000040)=""/197) 17:13:31 executing program 7: 17:13:31 executing program 6: 17:13:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:31 executing program 7: 17:13:31 executing program 6: 17:13:32 executing program 1: 17:13:32 executing program 6: 17:13:32 executing program 7: 17:13:32 executing program 4: 17:13:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) 17:13:32 executing program 1: 17:13:32 executing program 6: 17:13:32 executing program 7: 17:13:32 executing program 4: [ 129.525636] kauditd_printk_skb: 8 callbacks suppressed [ 129.525659] audit: type=1326 audit(1529687612.524:97): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9151 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:32 executing program 4: 17:13:32 executing program 5: 17:13:32 executing program 7: 17:13:32 executing program 1: 17:13:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:32 executing program 6: 17:13:32 executing program 3: 17:13:32 executing program 1: 17:13:32 executing program 5: 17:13:32 executing program 7: 17:13:32 executing program 4: [ 129.905215] audit: type=1326 audit(1529687612.903:98): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9176 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:33 executing program 5: 17:13:33 executing program 6: 17:13:33 executing program 4: 17:13:33 executing program 7: 17:13:33 executing program 1: 17:13:33 executing program 3: 17:13:33 executing program 0: 17:13:33 executing program 1: 17:13:33 executing program 3: 17:13:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000240)) 17:13:33 executing program 4: 17:13:33 executing program 7: 17:13:33 executing program 6: 17:13:33 executing program 5: 17:13:33 executing program 0: 17:13:33 executing program 1: 17:13:33 executing program 3: 17:13:33 executing program 0: [ 130.862473] audit: type=1326 audit(1529687613.861:99): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9206 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:33 executing program 3: 17:13:33 executing program 4: 17:13:33 executing program 6: 17:13:33 executing program 5: 17:13:33 executing program 1: 17:13:34 executing program 7: 17:13:34 executing program 0: 17:13:34 executing program 0: 17:13:34 executing program 1: 17:13:34 executing program 7: 17:13:34 executing program 6: 17:13:34 executing program 5: 17:13:34 executing program 4: 17:13:34 executing program 3: 17:13:34 executing program 2: 17:13:34 executing program 7: 17:13:34 executing program 1: 17:13:34 executing program 0: 17:13:34 executing program 3: 17:13:34 executing program 4: 17:13:34 executing program 6: 17:13:34 executing program 5: 17:13:34 executing program 2: 17:13:35 executing program 7: 17:13:35 executing program 0: 17:13:35 executing program 1: 17:13:35 executing program 4: 17:13:35 executing program 5: 17:13:35 executing program 3: 17:13:35 executing program 6: 17:13:35 executing program 2: 17:13:35 executing program 7: 17:13:35 executing program 0: 17:13:35 executing program 1: 17:13:35 executing program 5: 17:13:35 executing program 4: 17:13:35 executing program 6: 17:13:35 executing program 3: 17:13:35 executing program 7: 17:13:35 executing program 2: 17:13:35 executing program 0: 17:13:35 executing program 1: 17:13:35 executing program 5: 17:13:35 executing program 6: 17:13:35 executing program 3: 17:13:35 executing program 4: 17:13:35 executing program 2: 17:13:35 executing program 7: 17:13:35 executing program 1: 17:13:35 executing program 5: 17:13:35 executing program 0: 17:13:35 executing program 3: 17:13:35 executing program 6: 17:13:35 executing program 2: 17:13:35 executing program 4: 17:13:35 executing program 7: 17:13:36 executing program 3: 17:13:36 executing program 5: 17:13:36 executing program 0: 17:13:36 executing program 1: 17:13:36 executing program 6: 17:13:36 executing program 4: 17:13:36 executing program 2: 17:13:36 executing program 7: 17:13:36 executing program 3: 17:13:36 executing program 1: 17:13:36 executing program 5: 17:13:36 executing program 0: 17:13:36 executing program 6: 17:13:36 executing program 4: 17:13:36 executing program 2: 17:13:36 executing program 3: 17:13:36 executing program 7: 17:13:36 executing program 1: 17:13:36 executing program 5: 17:13:36 executing program 0: 17:13:36 executing program 6: 17:13:36 executing program 3: 17:13:36 executing program 4: 17:13:36 executing program 2: 17:13:36 executing program 5: 17:13:36 executing program 7: 17:13:36 executing program 0: 17:13:36 executing program 1: 17:13:36 executing program 6: 17:13:36 executing program 2: 17:13:36 executing program 4: 17:13:36 executing program 3: 17:13:36 executing program 5: 17:13:36 executing program 1: 17:13:36 executing program 7: 17:13:36 executing program 0: 17:13:37 executing program 6: 17:13:37 executing program 3: 17:13:37 executing program 4: 17:13:37 executing program 2: 17:13:37 executing program 7: 17:13:37 executing program 5: 17:13:37 executing program 0: 17:13:37 executing program 1: 17:13:37 executing program 2: 17:13:37 executing program 3: 17:13:37 executing program 4: 17:13:37 executing program 6: 17:13:37 executing program 7: 17:13:37 executing program 2: 17:13:37 executing program 1: 17:13:37 executing program 5: 17:13:37 executing program 0: 17:13:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getgid() setregid(0x0, 0x0) 17:13:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getpgrp(0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) 17:13:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ppoll(&(0x7f0000000180), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x8) 17:13:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50003}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000380)=@buf={0x0, &(0x7f0000000280)}) 17:13:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) socket$inet(0x2, 0x0, 0x0) 17:13:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50002}]}) io_setup(0x0, &(0x7f00000001c0)) pwritev(0xffffffffffffffff, &(0x7f0000000a00), 0x0, 0x0) 17:13:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000000040)=0xc) bind$netlink(0xffffffffffffffff, &(0x7f0000000200)={0x10}, 0xc) 17:13:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) restart_syscall() 17:13:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000180)=0xff80) 17:13:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key(&(0x7f0000000140)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffff9) semop(0x0, &(0x7f0000000000), 0x0) 17:13:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@local, @loopback}, &(0x7f0000000200)=0xc) 17:13:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50003}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'veth1_to_bond\x00'}) 17:13:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) socket$inet(0x2, 0x0, 0x0) 17:13:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) restart_syscall() 17:13:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50003}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) 17:13:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key(&(0x7f0000000140)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffff9) socket$nl_generic(0x10, 0x3, 0x10) 17:13:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:13:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key(&(0x7f0000000140)='cifs.idmap\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffff9) semget$private(0x0, 0x0, 0x0) 17:13:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) socket$inet(0x2, 0x0, 0x0) 17:13:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) restart_syscall() 17:13:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) fchmodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:13:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioprio_set$pid(0x0, 0x0, 0x0) 17:13:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) socket$inet(0x2, 0x0, 0x0) 17:13:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 17:13:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) restart_syscall() 17:13:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) socket$inet(0x2, 0x0, 0x0) 17:13:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioprio_set$pid(0x0, 0x0, 0x0) 17:13:38 executing program 0: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x0) 17:13:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) restart_syscall() 17:13:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000ddfffc)=0x1, 0xfe8c) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendmmsg(r0, &(0x7f00000092c0)=[{{&(0x7f0000002c40)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "f02756cfccfc23ad45f0b23e54ca912fd586564094229c357f7628c420961bdb109e88f1ddb1fe7615a7c9541371874a7a684f022c9957210cb72f97401812"}, 0x80, &(0x7f0000002d80), 0x0, &(0x7f0000002dc0)}}], 0x1, 0x0) 17:13:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) socket$inet(0x2, 0x0, 0x0) 17:13:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) restart_syscall() 17:13:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioprio_set$pid(0x0, 0x0, 0x0) 17:13:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) socket$inet(0x2, 0x0, 0x0) 17:13:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) restart_syscall() 17:13:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:39 executing program 7: getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioprio_set$pid(0x0, 0x0, 0x0) 17:13:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:39 executing program 5: getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) socket$inet(0x2, 0x0, 0x0) 17:13:39 executing program 6: add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) restart_syscall() 17:13:39 executing program 7: getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) ioprio_set$pid(0x0, 0x0, 0x0) 17:13:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:40 executing program 6: add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) restart_syscall() 17:13:40 executing program 5: getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) socket$inet(0x2, 0x0, 0x0) 17:13:40 executing program 7: getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:40 executing program 1: getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) ioprio_set$pid(0x0, 0x0, 0x0) 17:13:40 executing program 6: add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) restart_syscall() 17:13:40 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:40 executing program 5: getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) socket$inet(0x2, 0x0, 0x0) 17:13:40 executing program 1: getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:40 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) restart_syscall() 17:13:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) ioprio_set$pid(0x0, 0x0, 0x0) 17:13:40 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:40 executing program 1: getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:40 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) socket$inet(0x2, 0x0, 0x0) 17:13:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:40 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:40 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) restart_syscall() 17:13:40 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:40 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:40 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:40 executing program 2: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioprio_set$pid(0x0, 0x0, 0x0) 17:13:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:40 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:40 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) restart_syscall() 17:13:41 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:41 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) socket$inet(0x2, 0x0, 0x0) 17:13:41 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:41 executing program 2: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioprio_set$pid(0x0, 0x0, 0x0) 17:13:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:41 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) restart_syscall() 17:13:41 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:41 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:41 executing program 2: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioprio_set$pid(0x0, 0x0, 0x0) 17:13:41 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) socket$inet(0x2, 0x0, 0x0) 17:13:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:41 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) restart_syscall() 17:13:41 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:41 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioprio_set$pid(0x0, 0x0, 0x0) 17:13:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:41 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) restart_syscall() 17:13:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) socket$inet(0x2, 0x0, 0x0) 17:13:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:41 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:41 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:41 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioprio_set$pid(0x0, 0x0, 0x0) 17:13:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) restart_syscall() 17:13:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:42 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) socket$inet(0x2, 0x0, 0x0) 17:13:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:42 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioprio_set$pid(0x0, 0x0, 0x0) 17:13:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) restart_syscall() 17:13:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) socket$inet(0x2, 0x0, 0x0) 17:13:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioprio_set$pid(0x0, 0x0, 0x0) 17:13:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) restart_syscall() 17:13:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) restart_syscall() 17:13:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioprio_set$pid(0x0, 0x0, 0x0) 17:13:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) socket$inet(0x2, 0x0, 0x0) 17:13:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) [ 139.906007] audit: type=1326 audit(1529687622.904:100): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9924 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioprio_set$pid(0x0, 0x0, 0x0) [ 140.001156] audit: type=1326 audit(1529687622.970:101): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9938 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) socket$inet(0x2, 0x0, 0x0) [ 140.171202] audit: type=1326 audit(1529687623.169:102): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9952 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) restart_syscall() 17:13:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioprio_set$pid(0x0, 0x0, 0x0) 17:13:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) [ 140.809852] audit: type=1326 audit(1529687623.808:103): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9983 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) socket$inet(0x2, 0x0, 0x0) 17:13:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioprio_set$pid(0x0, 0x0, 0x0) 17:13:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) [ 140.896880] audit: type=1326 audit(1529687623.876:104): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9988 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 140.967327] audit: type=1326 audit(1529687623.945:106): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9995 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 140.987085] audit: type=1326 audit(1529687623.943:105): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9993 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioprio_set$pid(0x0, 0x0, 0x0) 17:13:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) socket$inet(0x2, 0x0, 0x0) 17:13:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioprio_set$pid(0x0, 0x0, 0x0) [ 141.156583] audit: type=1326 audit(1529687624.155:107): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10010 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 141.221974] audit: type=1326 audit(1529687624.182:108): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10015 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) [ 141.270320] audit: type=1326 audit(1529687624.268:109): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10020 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff9) restart_syscall() 17:13:44 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000840), 0x0) r1 = accept(r0, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:44 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000840), 0x0) r1 = accept(r0, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:44 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000840), 0x0) r1 = accept(r0, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 17:13:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 17:13:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) socket$inet(0x2, 0x0, 0x0) 17:13:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioprio_set$pid(0x0, 0x0, 0x0) 17:13:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:13:45 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x80a, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) 17:13:45 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x80a, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:45 executing program 7: r0 = socket$inet6(0xa, 0x802, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") bpf$MAP_CREATE(0x0, &(0x7f0000733000), 0x2c) bpf$BPF_GET_MAP_INFO(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x28, &(0x7f00000000c0)}, 0x7) 17:13:46 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x80a, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:46 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) socket$inet(0x2, 0x0, 0x0) 17:13:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioprio_set$pid(0x0, 0x0, 0x0) 17:13:46 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000200)="295ee1311f16f477671070") setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000000)=""/175, 0xffffffffffffff02}, &(0x7f00000000c0)}, 0x20) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000001c0), 0xb) 17:13:46 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x80a, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:46 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:46 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x80a, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:46 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000600)=""/182, &(0x7f0000000480)=0xb6) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 17:13:46 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:46 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:46 executing program 4: unshare(0x24020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x10, 0x5, 0x2}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f0000000080)}, 0x10) 17:13:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) 17:13:46 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x80a, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x20) signalfd4(0xffffffffffffff9c, &(0x7f0000000040), 0x8, 0x0) 17:13:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:47 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x80a, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:47 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:47 executing program 1: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) 17:13:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) ioctl$void(0xffffffffffffffff, 0x0) 17:13:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000180)=""/72) 17:13:47 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000080)) 17:13:47 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0xc) 17:13:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) 17:13:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:47 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000080)) 17:13:47 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) close(0xffffffffffffffff) 17:13:47 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000080)) 17:13:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc004240a, &(0x7f0000000180)) 17:13:47 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6(0xa, 0x80000000005, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) syslog(0x0, &(0x7f0000000240)=""/4096, 0x1000) 17:13:48 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6(0xa, 0x80000000005, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='threaded\x00', 0x9) 17:13:48 executing program 6: r0 = socket(0x11, 0x80a, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840), 0x0) r2 = accept(r1, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'bond0\x00'}) 17:13:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) 17:13:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:48 executing program 6: r0 = socket(0x11, 0x80a, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58000}]}) io_setup(0x0, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:48 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6(0xa, 0x80000000005, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000240)) 17:13:48 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000900)=@getroute={0x14, 0x1a, 0x1c974209d04c2781}, 0x14}, 0x1}, 0x0) 17:13:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:48 executing program 6: r0 = socket(0x11, 0x80a, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:48 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) 17:13:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58000}]}) io_setup(0x0, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:48 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000900)=@getroute={0x14, 0x1a, 0x1c974209d04c2781}, 0x14}, 0x1}, 0x0) 17:13:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:48 executing program 0: syz_emit_ethernet(0x32, &(0x7f00000000c0)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xac, 0x14, 0x14}, @multicast1=0xe0000001, {[@timestamp={0x44, 0x8, 0x5, 0x0, 0x0, [{}]}]}}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 17:13:48 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x80a, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:48 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) 17:13:48 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00007e5000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000001000)=[{&(0x7f0000000740)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000840)}], 0x1, &(0x7f0000000b40), 0x0, 0x8000}, {&(0x7f0000000b80)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000ec0), 0x0, &(0x7f0000000f80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r1, r1, r0, r0]}, @cred={0x20, 0x1, 0x2}], 0x60, 0x10}], 0x2, 0x0) sendmmsg$unix(r1, &(0x7f0000000700)=[{&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000440)="e57e5c6fe5b82069d3a3a101025802f9e961b7ee7749600de2a965a2ac2ea13a92a2f2b29166e99008646391c57fa8bd4df22554958854c78750eadaeecaa4e979f834ca44669d53db19236d5f7f8eff0958452371b34739af8367c5e2fa3336aaa79192c5daf0baa26587605c3a283b31eb6dba229bdf7c5ae8a334f635e2ac565130ead38f8fe639567af231f428245104871603df75507d8e94370b11ba41fb02", 0xa2}], 0x1, &(0x7f00000006c0), 0x0, 0x4004}], 0x1, 0x8001) 17:13:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58000}]}) io_setup(0x0, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:48 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x0) 17:13:48 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x80a, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:49 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) 17:13:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000000)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast1=0xe0000001}, 0xc) 17:13:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000180), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000ad6fad), 0x0, 0x3fffffa, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0xc4, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 17:13:49 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x80a, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:49 executing program 7: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58000}]}) io_setup(0x0, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:49 executing program 2: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:49 executing program 4: socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:49 executing program 5: r0 = socket(0x2000000000000010, 0x802, 0x0) write(r0, &(0x7f0000000280)="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", 0xfc) 17:13:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) 17:13:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) pipe(&(0x7f0000000140)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 17:13:49 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x80a, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:49 executing program 7: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:49 executing program 2: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:49 executing program 4: socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000040)) 17:13:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) 17:13:49 executing program 2: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:49 executing program 7: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:49 executing program 4: socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:49 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x80a, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) pipe(&(0x7f0000000140)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 17:13:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:49 executing program 7: r0 = socket$inet_sctp(0x2, 0x0, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000040)) 17:13:50 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) 17:13:50 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x80a, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:50 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) pipe(&(0x7f0000000140)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 17:13:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:50 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:50 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:50 executing program 7: r0 = socket$inet_sctp(0x2, 0x0, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000040)) 17:13:50 executing program 1: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) 17:13:50 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:50 executing program 3: io_setup(0x0, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) pipe(&(0x7f0000000140)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 17:13:50 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:50 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:50 executing program 1: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) 17:13:50 executing program 7: r0 = socket$inet_sctp(0x2, 0x0, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000040)) 17:13:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:50 executing program 3: io_setup(0x0, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:50 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:50 executing program 1: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) 17:13:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 17:13:50 executing program 3: io_setup(0x0, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000040)) 17:13:51 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) 17:13:51 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x80a, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:51 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58000}]}) io_setup(0x0, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 17:13:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000040)) 17:13:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) 17:13:51 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x80a, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:51 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:51 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58000}]}) io_setup(0x0, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 17:13:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000040)) 17:13:51 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x80a, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)) 17:13:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) 17:13:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:51 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58000}]}) io_setup(0x0, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:51 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:51 executing program 0: pipe(&(0x7f0000000140)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 17:13:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) 17:13:51 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000040)) 17:13:51 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x80a, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000080)) 17:13:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000240)}) io_setup(0x0, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:52 executing program 0: pipe(&(0x7f0000000140)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 17:13:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) 17:13:52 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:52 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x80a, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000080)) 17:13:52 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000040)) 17:13:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000240)}) io_setup(0x0, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:52 executing program 6: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x80a, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000080)) 17:13:52 executing program 0: pipe(&(0x7f0000000140)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 17:13:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) 17:13:52 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000240)}) io_setup(0x0, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000040)) [ 149.419091] kauditd_printk_skb: 11 callbacks suppressed [ 149.419114] audit: type=1326 audit(1529687632.417:121): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10675 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000900)) 17:13:52 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(0xffffffffffffffff, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) 17:13:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) pipe(&(0x7f0000000140)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 17:13:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50000}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000040)) [ 149.564775] audit: type=1326 audit(1529687632.552:122): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10687 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x58000}]}) io_setup(0x0, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:52 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x0, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) 17:13:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000040)) 17:13:53 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) pipe(&(0x7f0000000140)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 17:13:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x58000}]}) io_setup(0x0, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:13:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) 17:13:53 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x0, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) [ 150.314159] audit: type=1326 audit(1529687633.312:123): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10722 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 150.399186] audit: type=1326 audit(1529687633.355:124): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10728 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:53 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) pipe(&(0x7f0000000140)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 17:13:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x58000}]}) io_setup(0x0, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:53 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x0, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) [ 150.553395] audit: type=1326 audit(1529687633.552:125): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10743 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:13:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) pipe(&(0x7f0000000140)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) [ 150.609212] audit: type=1326 audit(1529687633.598:126): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10752 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000240)=[{0x6}]}) io_setup(0x0, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:53 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) [ 150.731218] audit: type=1326 audit(1529687633.729:127): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10761 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) pipe(&(0x7f0000000140)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 17:13:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:13:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000001c0)=""/4) 17:13:54 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:54 executing program 5: r0 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, &(0x7f00000002c0)=0x90) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x20) 17:13:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) pipe(&(0x7f0000000140)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) [ 151.307171] audit: type=1326 audit(1529687634.305:128): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10777 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:54 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}, 0x1}, 0x0) 17:13:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) pipe(&(0x7f0000000140)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 17:13:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000640)) 17:13:54 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:13:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) [ 151.618136] audit: type=1326 audit(1529687634.616:129): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10797 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000240)=[{0x6}]}) io_setup(0x0, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) pipe(&(0x7f0000000140)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) [ 151.663730] audit: type=1326 audit(1529687634.637:130): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10806 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:54 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:13:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) pipe(&(0x7f0000000140)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 17:13:55 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) memfd_create(&(0x7f0000000400)='IPVS\x00', 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000600)=0x3) 17:13:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:13:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) pipe(&(0x7f0000000140)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 17:13:55 executing program 4: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80000000005, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000640)=@assoc_value, &(0x7f0000000680)=0x8) 17:13:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:13:55 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f47767") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:13:55 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:13:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/233, &(0x7f0000000000)=0xe9) 17:13:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:13:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000240)=[{0x6}]}) io_setup(0x0, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:13:55 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f47767") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:55 executing program 6: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:13:55 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:13:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:13:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:13:55 executing program 6: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:13:55 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f47767") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) pipe(&(0x7f0000000140)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 17:13:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:13:56 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:13:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:13:56 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f4776710") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:56 executing program 6: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:13:56 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:13:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:13:56 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:13:56 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f4776710") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:13:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:13:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 17:13:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:13:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:13:56 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f4776710") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) pipe(&(0x7f0000000140)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) 17:13:57 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:13:57 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:13:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:13:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:13:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:13:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) 17:13:57 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:13:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:13:57 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:57 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:13:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:13:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:13:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) exit(0x0) 17:13:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:13:58 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:13:58 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:13:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:13:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 17:13:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:13:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:13:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:13:58 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:13:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:13:58 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:13:58 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:13:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 17:13:58 executing program 4: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:13:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:13:58 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:13:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:13:58 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:58 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:13:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:13:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 17:13:58 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 17:13:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:13:58 executing program 4: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:13:58 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:13:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:13:58 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:13:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:13:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 17:13:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000280)=""/4096) 17:13:58 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:13:59 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:13:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:13:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:13:59 executing program 4: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:13:59 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) [ 156.166109] kauditd_printk_skb: 6 callbacks suppressed [ 156.166133] audit: type=1326 audit(1529687639.164:137): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11106 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:13:59 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:13:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 17:13:59 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:13:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000000c0)) 17:13:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:13:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:13:59 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:13:59 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:13:59 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:13:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 17:13:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240), &(0x7f0000000300)=0x14) 17:13:59 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:13:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:14:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:14:00 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:14:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:14:00 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:14:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 17:14:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:14:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:14:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) pipe(&(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) 17:14:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) [ 157.121448] audit: type=1326 audit(1529687640.120:138): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11184 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:00 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:14:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:14:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 17:14:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:14:00 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:14:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) pipe(&(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) 17:14:00 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:14:01 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 17:14:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:14:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:14:01 executing program 0: socket$netlink(0x10, 0x3, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:14:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:14:01 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:14:01 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:14:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) pipe(&(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) 17:14:01 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) [ 158.096204] audit: type=1326 audit(1529687641.093:139): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11235 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:01 executing program 0: socket$netlink(0x10, 0x3, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:14:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:14:01 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:14:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:14:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) pipe(&(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) 17:14:01 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 17:14:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:14:01 executing program 0: socket$netlink(0x10, 0x3, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:14:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:14:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:14:01 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:14:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) 17:14:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 17:14:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:14:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:14:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f726566726573685f70657269b76f640cb78db445baf2bf0dc56066a605e9582ad4a6ef656c1d05b550bd60ae158d52bab94e250d6fac37cb86828771e3416ecc8018dc1439192c8adf5a41beb1822e91a9e6d6a47ea4ca70892b67f94cccc34875cdce6850", 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) [ 159.040888] audit: type=1326 audit(1529687642.039:140): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11283 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:14:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:14:02 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:14:02 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 17:14:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) [ 159.215518] audit: type=1326 audit(1529687642.214:141): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11299 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:14:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f726566726573685f70657269b76f640cb78db445baf2bf0dc56066a605e9582ad4a6ef656c1d05b550bd60ae158d52bab94e250d6fac37cb86828771e3416ecc8018dc1439192c8adf5a41beb1822e91a9e6d6a47ea4ca70892b67f94cccc34875cdce6850", 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:14:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:14:02 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 17:14:02 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:14:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:14:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:14:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) 17:14:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f726566726573685f70657269b76f640cb78db445baf2bf0dc56066a605e9582ad4a6ef656c1d05b550bd60ae158d52bab94e250d6fac37cb86828771e3416ecc8018dc1439192c8adf5a41beb1822e91a9e6d6a47ea4ca70892b67f94cccc34875cdce6850", 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:14:02 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:14:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) socket$netlink(0x10, 0x3, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:14:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) [ 159.976905] audit: type=1326 audit(1529687642.973:142): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11338 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:14:03 executing program 7: pipe(&(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) 17:14:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) socket$netlink(0x10, 0x3, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:14:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 17:14:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f726566726573685f70657269b76f640cb78db445baf2bf0dc56066a605e9582ad4a6ef656c1d05b550bd60ae158d52bab94e250d6fac37cb86828771e3416ecc8018dc1439192c8adf5a41beb1822e91a9e6d6a47ea4ca70892b67f94cccc34875cdce6850", 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:14:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:14:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:14:03 executing program 7: pipe(&(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) [ 160.269824] audit: type=1326 audit(1529687643.268:143): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11370 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:14:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) [ 160.405358] audit: type=1326 audit(1529687643.403:144): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11381 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:03 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 17:14:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) socket$netlink(0x10, 0x3, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:14:03 executing program 7: pipe(&(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) 17:14:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:14:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:14:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) [ 160.915240] audit: type=1326 audit(1529687643.914:145): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11394 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 160.989502] audit: type=1326 audit(1529687643.961:146): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11403 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)) 17:14:04 executing program 7: seccomp(0x0, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) pipe(&(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) 17:14:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:14:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 17:14:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:14:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) [ 161.227076] audit: type=1326 audit(1529687644.225:147): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11420 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:14:04 executing program 7: seccomp(0x0, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) pipe(&(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) 17:14:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:14:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) [ 161.460213] audit: type=1326 audit(1529687644.458:148): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11433 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:14:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 17:14:04 executing program 7: seccomp(0x0, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) pipe(&(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) 17:14:04 executing program 6: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f726566726573685f70657269b76f640cb78db445baf2bf0dc56066a605e9582ad4a6ef656c1d05b550bd60ae158d52bab94e250d6fac37cb86828771e3416ecc8018dc1439192c8adf5a41beb1822e91a9e6d6a47ea4ca70892b67f94cccc34875cdce6850", 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:14:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:14:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) getuid() fchown(0xffffffffffffffff, 0x0, 0x0) [ 161.910570] audit: type=1326 audit(1529687644.909:149): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11447 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 161.970697] audit: type=1326 audit(1529687644.968:150): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11445 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) 17:14:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:14:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) 17:14:05 executing program 6: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f726566726573685f70657269b76f640cb78db445baf2bf0dc56066a605e9582ad4a6ef656c1d05b550bd60ae158d52bab94e250d6fac37cb86828771e3416ecc8018dc1439192c8adf5a41beb1822e91a9e6d6a47ea4ca70892b67f94cccc34875cdce6850", 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:14:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)) 17:14:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) [ 162.162515] audit: type=1326 audit(1529687645.161:151): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11465 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000140), &(0x7f0000000180), 0x131, &(0x7f0000000280)) 17:14:05 executing program 6: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f726566726573685f70657269b76f640cb78db445baf2bf0dc56066a605e9582ad4a6ef656c1d05b550bd60ae158d52bab94e250d6fac37cb86828771e3416ecc8018dc1439192c8adf5a41beb1822e91a9e6d6a47ea4ca70892b67f94cccc34875cdce6850", 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:14:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)) 17:14:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) 17:14:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000002f80)={&(0x7f0000002e80)={0x10}, 0xc, &(0x7f0000002f40)={&(0x7f0000002f00)=ANY=[]}, 0x1}, 0x0) [ 162.438222] audit: type=1326 audit(1529687645.436:152): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11488 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 17:14:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) pipe(&(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) 17:14:05 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f726566726573685f70657269b76f640cb78db445baf2bf0dc56066a605e9582ad4a6ef656c1d05b550bd60ae158d52bab94e250d6fac37cb86828771e3416ecc8018dc1439192c8adf5a41beb1822e91a9e6d6a47ea4ca70892b67f94cccc34875cdce6850", 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:14:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 17:14:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000140), &(0x7f0000000180), 0x131, &(0x7f0000000280)) 17:14:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) tkill(0x0, 0x0) [ 162.876448] audit: type=1326 audit(1529687645.875:153): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11499 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 162.953170] audit: type=1326 audit(1529687645.930:154): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11509 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:14:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) pipe(&(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) 17:14:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f726566726573685f70657269b76f640cb78db445baf2bf0dc56066a605e9582ad4a6ef656c1d05b550bd60ae158d52bab94e250d6fac37cb86828771e3416ecc8018dc1439192c8adf5a41beb1822e91a9e6d6a47ea4ca70892b67f94cccc34875cdce6850", 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:14:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000140), &(0x7f0000000180), 0x131, &(0x7f0000000280)) 17:14:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) tkill(0x0, 0x0) 17:14:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) pipe(&(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) 17:14:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f726566726573685f70657269b76f640cb78db445baf2bf0dc56066a605e9582ad4a6ef656c1d05b550bd60ae158d52bab94e250d6fac37cb86828771e3416ecc8018dc1439192c8adf5a41beb1822e91a9e6d6a47ea4ca70892b67f94cccc34875cdce6850", 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) [ 163.173210] audit: type=1326 audit(1529687646.171:155): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11527 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f726566726573685f70657269b76f640cb78db445baf2bf0dc56066a605e9582ad4a6ef656c1d05b550bd60ae158d52bab94e250d6fac37cb86828771e3416ecc8018dc1439192c8adf5a41beb1822e91a9e6d6a47ea4ca70892b67f94cccc34875cdce6850", 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:14:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) tkill(0x0, 0x0) 17:14:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 17:14:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) 17:14:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) [ 163.774472] audit: type=1326 audit(1529687646.773:156): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11553 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f726566726573685f70657269b76f640cb78db445baf2bf0dc56066a605e9582ad4a6ef656c1d05b550bd60ae158d52bab94e250d6fac37cb86828771e3416ecc8018dc1439192c8adf5a41beb1822e91a9e6d6a47ea4ca70892b67f94cccc34875cdce6850", 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:14:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) tkill(0x0, 0x0) 17:14:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f726566726573685f70657269b76f640cb78db445baf2bf0dc56066a605e9582ad4a6ef656c1d05b550bd60ae158d52bab94e250d6fac37cb86828771e3416ecc8018dc1439192c8adf5a41beb1822e91a9e6d6a47ea4ca70892b67f94cccc34875cdce6850", 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:14:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) 17:14:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@dev, @multicast1, @dev}, &(0x7f0000000240)=0xc) 17:14:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) tkill(0x0, 0x0) 17:14:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f726566726573685f70657269b76f640cb78db445baf2bf0dc56066a605e9582ad4a6ef656c1d05b550bd60ae158d52bab94e250d6fac37cb86828771e3416ecc8018dc1439192c8adf5a41beb1822e91a9e6d6a47ea4ca70892b67f94cccc34875cdce6850", 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:14:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) tkill(0x0, 0x0) 17:14:07 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f00000009c0)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)}], 0x1, &(0x7f0000000140)}, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000001180)}], 0x1, &(0x7f0000000200)}, 0x0) 17:14:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 17:14:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f726566726573685f70657269b76f640cb78db445baf2bf0dc56066a605e9582ad4a6ef656c1d05b550bd60ae158d52bab94e250d6fac37cb86828771e3416ecc8018dc1439192c8adf5a41beb1822e91a9e6d6a47ea4ca70892b67f94cccc34875cdce6850", 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:14:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) tkill(0x0, 0x0) 17:14:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) 17:14:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f726566726573685f70657269b76f640cb78db445baf2bf0dc56066a605e9582ad4a6ef656c1d05b550bd60ae158d52bab94e250d6fac37cb86828771e3416ecc8018dc1439192c8adf5a41beb1822e91a9e6d6a47ea4ca70892b67f94cccc34875cdce6850", 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:14:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:07 executing program 2: socket$netlink(0x10, 0x3, 0x0) tkill(0x0, 0x0) 17:14:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 17:14:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) 17:14:08 executing program 2: socket$netlink(0x10, 0x3, 0x0) tkill(0x0, 0x0) 17:14:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f726566726573685f70657269b76f640cb78db445baf2bf0dc56066a605e9582ad4a6ef656c1d05b550bd60ae158d52bab94e250d6fac37cb86828771e3416ecc8018dc1439192c8adf5a41beb1822e91a9e6d6a47ea4ca70892b67f94cccc34875cdce6850", 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:14:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 17:14:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @loopback=0x7f000001}}) 17:14:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f00000000c0), 0x4) 17:14:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:08 executing program 2: socket$netlink(0x10, 0x3, 0x0) tkill(0x0, 0x0) 17:14:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 17:14:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:08 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) tkill(0x0, 0x0) 17:14:08 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:09 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:09 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) tkill(0x0, 0x0) 17:14:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 17:14:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) iopl(0x0) 17:14:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f726566726573685f70657269b76f640cb78db445baf2bf0dc56066a605e9582ad4a6ef656c1d05b550bd60ae158d52bab94e250d6fac37cb86828771e3416ecc8018dc1439192c8adf5a41beb1822e91a9e6d6a47ea4ca70892b67f94cccc34875cdce6850", 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:14:09 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) tkill(0x0, 0x0) 17:14:09 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:09 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 17:14:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) iopl(0x0) 17:14:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:14:09 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 17:14:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$netlink(0x10, 0x3, 0x0) tkill(0x0, 0x0) 17:14:09 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:10 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:10 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:10 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$netlink(0x10, 0x3, 0x0) tkill(0x0, 0x0) 17:14:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) iopl(0x0) 17:14:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f726566726573685f70657269b76f640cb78db445baf2bf0dc56066a605e9582ad4a6ef656c1d05b550bd60ae158d52bab94e250d6fac37cb86828771e3416ecc8018dc1439192c8adf5a41beb1822e91a9e6d6a47ea4ca70892b67f94cccc34875cdce6850", 0x2, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:14:10 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 17:14:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) unlink(&(0x7f0000000040)='./file0\x00') [ 167.199769] kauditd_printk_skb: 6 callbacks suppressed [ 167.199793] audit: type=1326 audit(1529687650.198:163): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11774 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:10 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$netlink(0x10, 0x3, 0x0) tkill(0x0, 0x0) 17:14:10 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:10 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 17:14:10 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) iopl(0x0) 17:14:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:14:10 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) tkill(0x0, 0x0) 17:14:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:14:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:11 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:11 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 17:14:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) iopl(0x0) 17:14:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) tkill(0x0, 0x0) 17:14:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000400), 0x4) 17:14:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) tkill(0x0, 0x0) 17:14:11 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:11 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 17:14:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) iopl(0x0) 17:14:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:14:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) inotify_init1(0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) 17:14:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) tkill(0x0, 0x0) 17:14:11 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 17:14:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) iopl(0x0) 17:14:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) unlink(&(0x7f0000000040)='./file0\x00') [ 168.639659] audit: type=1326 audit(1529687651.629:164): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11864 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:11 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) 17:14:11 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 17:14:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:11 executing program 0: socket$inet6(0xa, 0x0, 0x0) iopl(0x0) 17:14:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) unlink(&(0x7f0000000040)='./file0\x00') 17:14:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 17:14:12 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) 17:14:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) tkill(0x0, 0x0) 17:14:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 17:14:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:12 executing program 0: socket$inet6(0xa, 0x0, 0x0) iopl(0x0) 17:14:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) unlink(&(0x7f0000000040)='./file0\x00') 17:14:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:12 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) [ 169.611148] audit: type=1326 audit(1529687652.609:165): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11936 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:12 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) 17:14:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 17:14:12 executing program 7: socket$netlink(0x10, 0x3, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:14:12 executing program 0: socket$inet6(0xa, 0x0, 0x0) iopl(0x0) [ 169.822704] audit: type=1326 audit(1529687652.821:166): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11951 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:13 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) 17:14:13 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) iopl(0x0) 17:14:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 17:14:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) tkill(0x0, 0x0) 17:14:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:13 executing program 7: socket$netlink(0x10, 0x3, 0x0) unlink(&(0x7f0000000040)='./file0\x00') [ 170.542952] audit: type=1326 audit(1529687653.541:167): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11981 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 17:14:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) [ 170.595279] audit: type=1326 audit(1529687653.578:168): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11983 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:13 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) [ 170.721557] audit: type=1326 audit(1529687653.717:169): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11996 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:13 executing program 7: socket$netlink(0x10, 0x3, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:14:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:13 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) iopl(0x0) 17:14:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 17:14:13 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) [ 170.856906] audit: type=1326 audit(1529687653.855:170): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12010 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:13 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:14:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) [ 171.038254] audit: type=1326 audit(1529687654.036:171): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12023 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:14 executing program 6: accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) 17:14:14 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) iopl(0x0) 17:14:14 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:14:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) [ 171.502195] audit: type=1326 audit(1529687654.500:172): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12031 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:14 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:14:14 executing program 6: accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) 17:14:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) iopl(0x0) 17:14:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 17:14:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) socket$netlink(0x10, 0x3, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:14:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:14:14 executing program 6: accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) 17:14:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) socket$netlink(0x10, 0x3, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:14:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) iopl(0x0) 17:14:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) 17:14:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'lo-wlan1&}\x00'}, &(0x7f0000000380)=""/72, 0x48) 17:14:15 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) 17:14:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:14:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) socket$netlink(0x10, 0x3, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:14:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) iopl(0x0) 17:14:15 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) [ 172.480901] kauditd_printk_skb: 3 callbacks suppressed [ 172.480922] audit: type=1326 audit(1529687655.478:176): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12100 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:14:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0), 0x10) 17:14:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) iopl(0x0) [ 172.724426] audit: type=1326 audit(1529687655.721:177): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12115 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) iopl(0x0) 17:14:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:14:15 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) 17:14:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:14:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000000180), &(0x7f0000000280), 0x8, &(0x7f0000000240)) 17:14:15 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) 17:14:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) [ 173.096587] audit: type=1326 audit(1529687656.095:178): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12146 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x5}}, 0x14}, 0x1}, 0x0) 17:14:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:14:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) iopl(0x0) 17:14:16 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) 17:14:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:14:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000040)) 17:14:16 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) 17:14:16 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) 17:14:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:14:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:14:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) iopl(0x0) 17:14:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000040)=0x14) 17:14:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) [ 173.703795] audit: type=1326 audit(1529687656.702:179): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12177 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 173.777930] audit: type=1326 audit(1529687656.732:180): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12176 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:16 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) 17:14:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:14:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) membarrier(0x0, 0x0) 17:14:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:17 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) 17:14:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:17 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) 17:14:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:17 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) [ 174.209741] audit: type=1326 audit(1529687657.208:181): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12216 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:14:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) membarrier(0x0, 0x0) 17:14:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:17 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:14:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) iopl(0x0) [ 174.673326] audit: type=1326 audit(1529687657.672:182): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12242 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:17 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) [ 174.740304] audit: type=1326 audit(1529687657.705:183): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12234 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) membarrier(0x0, 0x0) 17:14:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:17 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:14:18 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) 17:14:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) [ 175.178305] audit: type=1326 audit(1529687658.177:184): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12277 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:14:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) membarrier(0x0, 0x0) 17:14:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:14:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) iopl(0x0) [ 175.648234] audit: type=1326 audit(1529687658.646:185): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12287 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:14:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) membarrier(0x0, 0x0) 17:14:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:19 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/94, 0x5e) 17:14:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:14:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:19 executing program 4: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:19 executing program 1: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) membarrier(0x0, 0x0) 17:14:19 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:14:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "d1e6dab3f03a94d7a3aae49a98bfbd1edd83786be57b17dc6e423ff0edc17aca249fb6d8a32aae515c9535d6a4d584e3f5725320e1b4a07cf4e6c9f15f051659", "ff667c0fcec749eb04f92c9e2f57cc202709726677cf61b753746700307d79fceb144469f95e6f7796c5cbe5819c8fe810fef8cf97b104c430529086a51ef432", "c0002a1ffd256090e401cca025eaf2ce1f0efaf9591dc3022619325d321aae02"}) 17:14:19 executing program 1: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:19 executing program 4: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) 17:14:19 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:14:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) membarrier(0x0, 0x0) 17:14:19 executing program 1: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:20 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 17:14:20 executing program 4: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:14:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) 17:14:20 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:20 executing program 3: socket(0x0, 0x0, 0x0) membarrier(0x0, 0x0) 17:14:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getrusage(0x0, &(0x7f00000000c0)) 17:14:20 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:20 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:14:20 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:20 executing program 3: socket(0x0, 0x0, 0x0) membarrier(0x0, 0x0) 17:14:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) 17:14:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) pipe(&(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) 17:14:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getrusage(0x0, &(0x7f00000000c0)) 17:14:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:14:20 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:20 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:20 executing program 3: socket(0x0, 0x0, 0x0) membarrier(0x0, 0x0) 17:14:20 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) [ 177.552097] kauditd_printk_skb: 2 callbacks suppressed [ 177.552120] audit: type=1326 audit(1529687660.549:188): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12429 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:20 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getrusage(0x0, &(0x7f00000000c0)) 17:14:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) pipe(&(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) 17:14:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:20 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:20 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) membarrier(0x0, 0x0) 17:14:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) 17:14:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getrusage(0x0, &(0x7f00000000c0)) 17:14:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:14:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) pipe(&(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) 17:14:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:21 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) membarrier(0x0, 0x0) 17:14:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) 17:14:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) getrusage(0x0, &(0x7f00000000c0)) [ 178.497892] audit: type=1326 audit(1529687661.496:189): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12484 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) getrusage(0x0, &(0x7f00000000c0)) 17:14:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:21 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) membarrier(0x0, 0x0) 17:14:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) 17:14:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) pipe(&(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) 17:14:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) membarrier(0x0, 0x0) 17:14:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:14:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) getrusage(0x0, &(0x7f00000000c0)) 17:14:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:22 executing program 0: socket$inet6(0xa, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) 17:14:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) [ 179.458496] audit: type=1326 audit(1529687662.457:190): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12549 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:22 executing program 6: socket$inet6(0xa, 0x0, 0x0) getrusage(0x0, &(0x7f00000000c0)) 17:14:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) 17:14:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) membarrier(0x0, 0x0) 17:14:22 executing program 0: socket$inet6(0xa, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) 17:14:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) [ 179.879630] audit: type=1326 audit(1529687662.878:191): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12582 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) membarrier(0x0, 0x0) 17:14:23 executing program 0: socket$inet6(0xa, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) 17:14:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) 17:14:23 executing program 6: socket$inet6(0xa, 0x0, 0x0) getrusage(0x0, &(0x7f00000000c0)) 17:14:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) [ 180.408724] audit: type=1326 audit(1529687663.404:192): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12594 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:23 executing program 7: pipe(&(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) 17:14:23 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) 17:14:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) membarrier(0x0, 0x0) 17:14:23 executing program 6: socket$inet6(0xa, 0x0, 0x0) getrusage(0x0, &(0x7f00000000c0)) [ 180.640361] audit: type=1326 audit(1529687663.638:193): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12618 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:14:23 executing program 7: pipe(&(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) 17:14:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) membarrier(0x0, 0x0) 17:14:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:23 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) [ 180.929402] audit: type=1326 audit(1529687663.927:194): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12645 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:24 executing program 7: pipe(&(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) 17:14:24 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) 17:14:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getrusage(0x0, &(0x7f00000000c0)) 17:14:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:14:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) membarrier(0x0, 0x0) [ 181.384791] audit: type=1326 audit(1529687664.382:195): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12671 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:14:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) membarrier(0x0, 0x0) 17:14:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) 17:14:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getrusage(0x0, &(0x7f00000000c0)) 17:14:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) pipe(&(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) [ 181.660260] audit: type=1326 audit(1529687664.658:196): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12681 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) pipe(&(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) [ 181.742179] audit: type=1326 audit(1529687664.695:197): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12689 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:14:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) bind$packet(0xffffffffffffffff, &(0x7f0000006a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 17:14:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getrusage(0x0, &(0x7f00000000c0)) 17:14:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) 17:14:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2=0xe0000002, @broadcast=0xffffffff}, 0x8) 17:14:25 executing program 7: seccomp(0x0, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) pipe(&(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) 17:14:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:14:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) getrusage(0x0, &(0x7f00000000c0)) 17:14:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) 17:14:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 17:14:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) membarrier(0x0, 0x0) 17:14:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:14:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) 17:14:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) getrusage(0x0, &(0x7f00000000c0)) 17:14:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) [ 182.720117] kauditd_printk_skb: 2 callbacks suppressed [ 182.720136] audit: type=1326 audit(1529687665.718:200): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12755 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) 17:14:25 executing program 2: accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) [ 182.838800] audit: type=1326 audit(1529687665.756:201): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12756 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) getrusage(0x0, &(0x7f00000000c0)) 17:14:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) 17:14:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:26 executing program 2: accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:14:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) 17:14:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getrusage(0x0, &(0x7f00000000c0)) 17:14:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) 17:14:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) membarrier(0x0, 0x0) 17:14:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sysinfo(&(0x7f00000000c0)=""/140) 17:14:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) pipe(&(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) 17:14:26 executing program 2: accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:14:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getrusage(0x0, &(0x7f00000000c0)) 17:14:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) 17:14:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) [ 183.677578] audit: type=1326 audit(1529687666.676:202): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12810 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) [ 183.766699] audit: type=1326 audit(1529687666.736:203): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12827 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) pipe(&(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) 17:14:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sysinfo(&(0x7f00000000c0)=""/140) 17:14:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getrusage(0x0, &(0x7f00000000c0)) 17:14:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000080)) 17:14:27 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:14:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) pipe(&(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) 17:14:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) 17:14:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sysinfo(&(0x7f00000000c0)=""/140) 17:14:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) pipe(&(0x7f0000002800)) shmctl$SHM_UNLOCK(0x0, 0xc) 17:14:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getrusage(0x0, &(0x7f00000000c0)) 17:14:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) 17:14:27 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:14:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) io_submit(0x0, 0x0, &(0x7f0000002800)) [ 184.661091] audit: type=1326 audit(1529687667.659:204): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12871 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:14:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sysinfo(&(0x7f00000000c0)=""/140) 17:14:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) pipe(&(0x7f0000002800)) shmctl$SHM_UNLOCK(0x0, 0xc) 17:14:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) io_submit(0x0, 0x0, &(0x7f0000002800)) 17:14:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) [ 184.712993] audit: type=1326 audit(1529687667.683:205): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12872 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 184.732855] audit: type=1326 audit(1529687667.698:206): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12867 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) sysinfo(&(0x7f00000000c0)=""/140) 17:14:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) pipe(&(0x7f0000002800)) shmctl$SHM_UNLOCK(0x0, 0xc) 17:14:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x0) 17:14:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:14:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) io_submit(0x0, 0x0, &(0x7f0000002800)) 17:14:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) sysinfo(&(0x7f00000000c0)=""/140) 17:14:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) pipe(&(0x7f0000002800)) shmctl$SHM_UNLOCK(0x0, 0xc) 17:14:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getrusage(0x0, &(0x7f00000000c0)) 17:14:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) [ 185.682116] audit: type=1326 audit(1529687668.680:207): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12926 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:14:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) sysinfo(&(0x7f00000000c0)=""/140) [ 185.752162] audit: type=1326 audit(1529687668.710:208): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12932 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:28 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) io_submit(0x0, 0x0, &(0x7f0000002800)) [ 185.832158] audit: type=1326 audit(1529687668.786:209): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12922 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'veth0\x00'}, 0x18) 17:14:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:14:29 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sysinfo(&(0x7f00000000c0)=""/140) 17:14:29 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'veth0\x00'}, 0x18) 17:14:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:14:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) io_submit(0x0, 0x0, &(0x7f0000002800)) 17:14:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getrusage(0x0, &(0x7f00000000c0)) 17:14:29 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000002780)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000000)) process_vm_writev(0x0, &(0x7f0000000380), 0x0, &(0x7f0000002700), 0x0, 0x0) 17:14:29 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sysinfo(&(0x7f00000000c0)=""/140) 17:14:29 executing program 0: 17:14:29 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sysinfo(&(0x7f00000000c0)=""/140) 17:14:29 executing program 0: 17:14:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:14:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) io_submit(0x0, 0x0, &(0x7f0000002800)) 17:14:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'veth0\x00'}, 0x18) 17:14:29 executing program 0: 17:14:29 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sysinfo(&(0x7f00000000c0)=""/140) 17:14:30 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) io_submit(0x0, 0x0, &(0x7f0000002800)) 17:14:30 executing program 0: 17:14:30 executing program 3: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) io_submit(0x0, 0x0, &(0x7f0000002800)) 17:14:30 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sysinfo(&(0x7f00000000c0)=""/140) 17:14:30 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sysinfo(&(0x7f00000000c0)=""/140) 17:14:30 executing program 5: 17:14:30 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:30 executing program 0: 17:14:30 executing program 6: 17:14:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:14:30 executing program 7: 17:14:30 executing program 3: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) io_submit(0x0, 0x0, &(0x7f0000002800)) 17:14:30 executing program 0: 17:14:30 executing program 5: 17:14:30 executing program 6: 17:14:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sysinfo(&(0x7f00000000c0)=""/140) 17:14:30 executing program 6: 17:14:30 executing program 0: [ 187.871735] kauditd_printk_skb: 3 callbacks suppressed [ 187.871759] audit: type=1326 audit(1529687670.870:213): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13055 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:30 executing program 5: 17:14:30 executing program 7: 17:14:30 executing program 3: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) io_submit(0x0, 0x0, &(0x7f0000002800)) 17:14:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sysinfo(&(0x7f00000000c0)=""/140) 17:14:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:31 executing program 7: 17:14:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:14:31 executing program 5: 17:14:31 executing program 0: 17:14:31 executing program 6: 17:14:31 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) io_submit(0x0, 0x0, &(0x7f0000002800)) 17:14:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sysinfo(&(0x7f00000000c0)=""/140) 17:14:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:31 executing program 7: 17:14:31 executing program 0: 17:14:31 executing program 5: 17:14:31 executing program 7: [ 188.853121] audit: type=1326 audit(1529687671.851:214): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13095 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sysinfo(&(0x7f00000000c0)=""/140) 17:14:31 executing program 6: 17:14:32 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) io_submit(0x0, 0x0, &(0x7f0000002800)) 17:14:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:32 executing program 0: 17:14:32 executing program 6: 17:14:32 executing program 5: 17:14:32 executing program 7: 17:14:32 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) io_submit(0x0, 0x0, &(0x7f0000002800)) 17:14:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sysinfo(&(0x7f00000000c0)=""/140) 17:14:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:32 executing program 0: 17:14:32 executing program 2: 17:14:32 executing program 6: 17:14:32 executing program 7: 17:14:32 executing program 5: 17:14:32 executing program 0: 17:14:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sysinfo(&(0x7f00000000c0)=""/140) 17:14:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:32 executing program 2: 17:14:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) io_submit(0x0, 0x0, &(0x7f0000002800)) 17:14:33 executing program 7: 17:14:33 executing program 6: 17:14:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sysinfo(&(0x7f00000000c0)=""/140) 17:14:33 executing program 0: 17:14:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:33 executing program 5: 17:14:33 executing program 2: 17:14:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) io_submit(0x0, 0x0, &(0x7f0000002800)) [ 190.238175] audit: type=1326 audit(1529687673.236:215): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13164 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:33 executing program 7: 17:14:33 executing program 0: 17:14:33 executing program 5: 17:14:33 executing program 2: 17:14:33 executing program 6: [ 190.327923] audit: type=1326 audit(1529687673.257:216): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13166 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:33 executing program 7: 17:14:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) io_submit(0x0, 0x0, &(0x7f0000002800)) 17:14:33 executing program 0: 17:14:33 executing program 5: 17:14:33 executing program 2: 17:14:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sysinfo(&(0x7f00000000c0)=""/140) 17:14:34 executing program 6: 17:14:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:34 executing program 7: 17:14:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) io_submit(0x0, 0x0, &(0x7f0000002800)) 17:14:34 executing program 0: 17:14:34 executing program 5: 17:14:34 executing program 2: 17:14:34 executing program 6: [ 191.148015] audit: type=1326 audit(1529687674.146:217): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13206 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 191.221286] audit: type=1326 audit(1529687674.220:218): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13214 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) io_submit(0x0, 0x0, &(0x7f0000002800)) 17:14:34 executing program 5: 17:14:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="706964732e63757272656e7400ab1b34c1116f002912a2ddd602de6661d28504ff293ecb6d868fc92a6088c93c59d34a50245d05a17fce", 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000500)) 17:14:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(0xffffffffffffffff, 0x0) 17:14:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @local}, &(0x7f0000000180)=0x10, 0x0) 17:14:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) 17:14:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 17:14:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) 17:14:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sysinfo(&(0x7f00000000c0)=""/140) 17:14:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(0xffffffffffffffff, 0x0) 17:14:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)="2f70726f632f7379732f6e65746be444baad4d28f42f6c626c63725f65787069726174696f6e00", 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) 17:14:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000040)) 17:14:35 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) io_submit(0x0, 0x0, &(0x7f0000002800)) [ 192.086002] audit: type=1326 audit(1529687675.084:219): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13254 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) [ 192.208171] audit: type=1326 audit(1529687675.206:220): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13267 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) io_submit(0x0, 0x0, &(0x7f0000002800)) 17:14:35 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 192.343254] audit: type=1326 audit(1529687675.341:221): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13275 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) accept(0xffffffffffffffff, &(0x7f0000000240)=@nl, &(0x7f00000000c0)=0x80) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) 17:14:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) 17:14:35 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) 17:14:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(0xffffffffffffffff, 0x0) 17:14:36 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) accept(0xffffffffffffffff, &(0x7f0000000240)=@nl, &(0x7f00000000c0)=0x80) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) 17:14:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) 17:14:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ftruncate(0xffffffffffffffff, 0x0) 17:14:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) io_submit(0x0, 0x0, &(0x7f0000002800)) 17:14:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 17:14:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) accept(0xffffffffffffffff, &(0x7f0000000240)=@nl, &(0x7f00000000c0)=0x80) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) 17:14:36 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) 17:14:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ftruncate(0xffffffffffffffff, 0x0) 17:14:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) [ 193.345516] audit: type=1326 audit(1529687676.344:222): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13331 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:36 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000000)) 17:14:36 executing program 6: syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) 17:14:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ftruncate(0xffffffffffffffff, 0x0) 17:14:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) accept(0xffffffffffffffff, &(0x7f0000000240)=@nl, &(0x7f00000000c0)=0x80) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) 17:14:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:36 executing program 6: syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) 17:14:37 executing program 7: memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(0xffffffffffffffff, 0x0) 17:14:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) io_submit(0x0, 0x0, &(0x7f0000002800)) 17:14:37 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000000)) 17:14:37 executing program 6: syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) 17:14:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) 17:14:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:37 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) [ 194.342197] audit: type=1326 audit(1529687677.340:223): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13400 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:37 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(0xffffffffffffffff, 0x0) 17:14:37 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) 17:14:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000000)) 17:14:37 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:37 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) 17:14:37 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:38 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(0xffffffffffffffff, 0x0) 17:14:38 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000000)) 17:14:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) 17:14:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) 17:14:38 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) 17:14:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50000}]}) memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(0xffffffffffffffff, 0x0) 17:14:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:38 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:38 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000000)) 17:14:38 executing program 2: accept(0xffffffffffffffff, &(0x7f0000000240)=@nl, &(0x7f00000000c0)=0x80) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) 17:14:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) 17:14:38 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) 17:14:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) memfd_create(&(0x7f0000000040)='\x00', 0x0) ftruncate(0xffffffffffffffff, 0x0) 17:14:38 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:38 executing program 2: accept(0xffffffffffffffff, &(0x7f0000000240)=@nl, &(0x7f00000000c0)=0x80) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) 17:14:38 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) 17:14:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000000)) [ 195.768104] audit: type=1326 audit(1529687678.766:224): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13485 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:38 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) 17:14:38 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:38 executing program 2: accept(0xffffffffffffffff, &(0x7f0000000240)=@nl, &(0x7f00000000c0)=0x80) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) 17:14:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) 17:14:38 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000000)) 17:14:39 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:39 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) 17:14:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) 17:14:39 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) accept(0xffffffffffffffff, &(0x7f0000000240)=@nl, &(0x7f00000000c0)=0x80) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) 17:14:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) 17:14:39 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:39 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000001180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000000)) 17:14:39 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:39 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000001c0)) connect$l2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast=0xffffffff}}}, 0x2e) 17:14:39 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000000)) 17:14:39 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) accept(0xffffffffffffffff, &(0x7f0000000240)=@nl, &(0x7f00000000c0)=0x80) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) 17:14:39 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) 17:14:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) 17:14:40 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:40 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) accept(0xffffffffffffffff, &(0x7f0000000240)=@nl, &(0x7f00000000c0)=0x80) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) 17:14:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) utime(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:14:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000000)) 17:14:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) 17:14:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) 17:14:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept(0xffffffffffffffff, &(0x7f0000000240)=@nl, &(0x7f00000000c0)=0x80) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) 17:14:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50000}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000000)) 17:14:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x4000000000050002}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) 17:14:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) 17:14:40 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) 17:14:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept(0xffffffffffffffff, &(0x7f0000000240)=@nl, &(0x7f00000000c0)=0x80) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) 17:14:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) [ 197.502191] audit: type=1326 audit(1529687680.500:225): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13621 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000000)) 17:14:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x4000000000050002}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) 17:14:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:40 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) [ 197.718399] audit: type=1326 audit(1529687680.717:226): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13637 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept(0xffffffffffffffff, &(0x7f0000000240)=@nl, &(0x7f00000000c0)=0x80) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) [ 197.812509] audit: type=1326 audit(1529687680.764:227): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13643 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) accept(0xffffffffffffffff, &(0x7f0000000240)=@nl, &(0x7f00000000c0)=0x80) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) 17:14:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x4000000000050002}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) 17:14:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) accept(0xffffffffffffffff, &(0x7f0000000240)=@nl, &(0x7f00000000c0)=0x80) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) 17:14:41 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) 17:14:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x4000000000050002}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) 17:14:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) [ 198.491674] audit: type=1326 audit(1529687681.490:228): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13684 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) accept(0xffffffffffffffff, &(0x7f0000000240)=@nl, &(0x7f00000000c0)=0x80) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) 17:14:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:41 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:41 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) 17:14:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x4000000000050002}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) 17:14:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000180)) 17:14:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) accept(0xffffffffffffffff, &(0x7f0000000240)=@nl, &(0x7f00000000c0)=0x80) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) [ 198.723557] audit: type=1326 audit(1529687681.722:229): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13700 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 198.810016] audit: type=1326 audit(1529687681.769:230): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13699 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:41 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) 17:14:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x4000000000050002}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) [ 198.854481] audit: type=1326 audit(1529687681.848:231): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13712 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 198.874277] audit: type=1326 audit(1529687681.849:232): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13711 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x1, &(0x7f0000000100)=""/1}, &(0x7f0000000180), &(0x7f0000000240)=""/199, 0x0, 0x0, 0x0, &(0x7f0000000340)}) 17:14:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) io_destroy(0x0) 17:14:42 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) 17:14:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x4000000000050002}]}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) [ 199.413503] audit: type=1326 audit(1529687682.411:233): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13726 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) 17:14:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:42 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) 17:14:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) 17:14:42 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 17:14:42 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) 17:14:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) accept(0xffffffffffffffff, &(0x7f0000000240)=@nl, &(0x7f00000000c0)=0x80) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) [ 199.775632] audit: type=1326 audit(1529687682.774:234): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13756 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) [ 199.831491] audit: type=1326 audit(1529687682.818:235): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13760 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:42 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) [ 199.914071] audit: type=1326 audit(1529687682.883:236): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13763 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 199.933841] audit: type=1326 audit(1529687682.899:237): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13765 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:43 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x4000000000050002}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) 17:14:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) 17:14:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) memfd_create(&(0x7f00000000c0)="266d643573756de400", 0x0) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) 17:14:43 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x4000000000050002}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) 17:14:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) 17:14:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:43 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x4000000000050002}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) 17:14:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)) 17:14:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100), &(0x7f0000000040)=0x68) 17:14:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) 17:14:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) accept(0xffffffffffffffff, &(0x7f0000000240)=@nl, &(0x7f00000000c0)=0x80) process_vm_readv(0x0, &(0x7f0000001480), 0x0, &(0x7f0000003940), 0x0, 0x0) 17:14:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000400)=""/214) 17:14:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) 17:14:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) open(&(0x7f0000000380)='./file2\x00', 0x0, 0x0) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/249, 0xf9) 17:14:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) 17:14:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) 17:14:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) 17:14:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) 17:14:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x4000000000050002}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) 17:14:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x4000000000050002}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) 17:14:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) sysfs$3(0x3) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x4000000000050002}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) 17:14:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'syzkaller1\x00'}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:44 executing program 4: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) 17:14:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) 17:14:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) 17:14:45 executing program 4: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) sysfs$3(0x3) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) 17:14:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'syzkaller1\x00'}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:45 executing program 4: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) sysfs$3(0x3) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'syzkaller1\x00'}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) 17:14:45 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) sysfs$3(0x3) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=""/78, 0x4e}) 17:14:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) 17:14:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'syzkaller1\x00'}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:46 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) 17:14:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:46 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:46 executing program 6: getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) accept4(0xffffffffffffff9c, &(0x7f00000002c0)=@in={0x0, 0x0, @broadcast}, &(0x7f00000000c0)=0x80, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000180), 0x4) 17:14:46 executing program 6: getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) 17:14:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000003f40)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000003f80)=0x10) 17:14:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:46 executing program 6: getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) socket$inet6(0xa, 0x0, 0x0) [ 204.049939] kauditd_printk_skb: 8 callbacks suppressed [ 204.049961] audit: type=1326 audit(1529687687.048:246): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14018 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:47 executing program 5: sysfs$3(0x3) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000400)=@generic) 17:14:47 executing program 5: sysfs$3(0x3) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:47 executing program 0: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'syzkaller1\x00'}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:47 executing program 2: getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000100)=0x4) 17:14:48 executing program 5: sysfs$3(0x3) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:48 executing program 0: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'syzkaller1\x00'}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:48 executing program 2: getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) io_setup(0x0, &(0x7f0000000500)) keyctl$clear(0x7, 0x0) 17:14:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) 17:14:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:48 executing program 2: getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:48 executing program 0: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'syzkaller1\x00'}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:48 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) sysfs$3(0x3) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) [ 205.371941] audit: type=1326 audit(1529687688.370:247): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14105 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:48 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'syzkaller1\x00'}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) creat(&(0x7f0000000300)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) 17:14:48 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) sysfs$3(0x3) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:48 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:48 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendto(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80) sendto$packet(r0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:48 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) sysfs$3(0x3) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:48 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'syzkaller1\x00'}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) creat(&(0x7f0000000300)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) 17:14:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:49 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendto(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80) sendto$packet(r0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) sysfs$3(0x3) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:49 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:49 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'syzkaller1\x00'}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) creat(&(0x7f0000000300)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) 17:14:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) sysfs$3(0x3) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) [ 206.362168] audit: type=1326 audit(1529687689.360:248): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14172 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:49 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendto(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80) sendto$packet(r0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:49 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'syzkaller1\x00'}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:49 executing program 3: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) creat(&(0x7f0000000300)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) 17:14:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) sysfs$3(0x3) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 17:14:50 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendto(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80) sendto$packet(r0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'syzkaller1\x00'}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:50 executing program 3: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) 17:14:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50002}]}) sysfs$3(0x3) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) [ 207.306842] audit: type=1326 audit(1529687690.305:249): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14220 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'syzkaller1\x00'}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:50 executing program 3: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:50 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendto$packet(r0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) [ 207.397851] audit: type=1326 audit(1529687690.336:250): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14214 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50002}]}) sysfs$3(0x3) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) 17:14:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'syzkaller1\x00'}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 17:14:51 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) 17:14:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50002}]}) sysfs$3(0x3) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'syzkaller1\x00'}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:51 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendto$packet(r0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) [ 208.261592] audit: type=1326 audit(1529687691.260:251): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14268 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) sysfs$3(0x3) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:51 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendto$packet(r0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'syzkaller1\x00'}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:51 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:51 executing program 7: creat(&(0x7f0000000300)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) [ 208.494099] audit: type=1326 audit(1529687691.492:252): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14289 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 17:14:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 17:14:52 executing program 1: sendto(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80) sendto$packet(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:52 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:52 executing program 7: creat(&(0x7f0000000300)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) 17:14:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'syzkaller1\x00'}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) [ 209.185471] audit: type=1326 audit(1529687692.183:253): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14312 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:52 executing program 7: creat(&(0x7f0000000300)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) [ 209.241403] audit: type=1326 audit(1529687692.218:254): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14319 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 209.261302] audit: type=1326 audit(1529687692.238:255): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14323 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:52 executing program 1: sendto(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80) sendto$packet(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) sysfs$3(0x3) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 17:14:52 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) creat(&(0x7f0000000300)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) 17:14:52 executing program 1: sendto(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80) sendto$packet(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) [ 209.512672] audit: type=1326 audit(1529687692.511:256): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14341 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:52 executing program 1: r0 = socket(0x0, 0x5, 0x0) sendto(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80) sendto$packet(r0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'syzkaller1\x00'}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 17:14:53 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) creat(&(0x7f0000000300)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) 17:14:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:53 executing program 1: r0 = socket(0x0, 0x5, 0x0) sendto(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80) sendto$packet(r0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) [ 210.155246] audit: type=1326 audit(1529687693.153:257): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14364 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 210.206657] audit: type=1326 audit(1529687693.205:258): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14371 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:53 executing program 1: r0 = socket(0x0, 0x5, 0x0) sendto(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80) sendto$packet(r0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:53 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) creat(&(0x7f0000000300)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) 17:14:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) sysfs$3(0x3) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040)=""/58, 0x3a, 0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 17:14:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:53 executing program 1: r0 = socket(0x1, 0x0, 0x0) sendto(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80) sendto$packet(r0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)) creat(&(0x7f0000000300)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) [ 210.528062] audit: type=1326 audit(1529687693.526:259): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14400 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 17:14:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/89, 0x59) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000140)=0x4) 17:14:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'syzkaller1\x00'}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x108) 17:14:54 executing program 1: r0 = socket(0x1, 0x0, 0x0) sendto(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80) sendto$packet(r0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)) creat(&(0x7f0000000300)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) 17:14:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:54 executing program 4: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) [ 211.079620] audit: type=1326 audit(1529687694.078:260): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14417 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 211.152379] audit: type=1326 audit(1529687694.150:261): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14424 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)) creat(&(0x7f0000000300)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) 17:14:54 executing program 1: r0 = socket(0x1, 0x0, 0x0) sendto(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80) sendto$packet(r0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:54 executing program 4: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) [ 211.191509] audit: type=1326 audit(1529687694.182:262): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14421 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:54 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80) sendto$packet(r0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:54 executing program 4: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 17:14:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) creat(&(0x7f0000000300)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) 17:14:54 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 17:14:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) creat(&(0x7f0000000300)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) 17:14:54 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80) sendto$packet(r0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:54 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 17:14:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) accept4(0xffffffffffffff9c, &(0x7f00000002c0)=@in={0x0, 0x0, @broadcast}, &(0x7f00000000c0)=0x80, 0x0) add_key(&(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 17:14:55 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80) sendto$packet(r0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:55 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 17:14:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) creat(&(0x7f0000000300)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) 17:14:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) linkat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0) 17:14:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) pipe2(&(0x7f0000000000), 0x0) 17:14:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) fchown(0xffffffffffffffff, 0x0, 0x0) 17:14:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58004}]}) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:14:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 17:14:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) creat(&(0x7f0000000300)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) 17:14:55 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendto(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80) sendto$packet(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:14:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:14:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 17:14:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) setresgid(0x0, 0x0, 0x0) 17:14:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 17:14:55 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendto(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80) sendto$packet(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 17:14:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:14:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:14:55 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendto(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80) sendto$packet(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:14:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 17:14:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) setresgid(0x0, 0x0, 0x0) 17:14:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)}) 17:14:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:14:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) creat(&(0x7f0000000300)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) 17:14:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:14:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 17:14:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) setresgid(0x0, 0x0, 0x0) 17:14:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 17:14:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:14:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 17:14:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 17:14:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:14:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) setresgid(0x0, 0x0, 0x0) 17:14:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 17:14:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:14:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 17:14:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:14:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 17:14:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:14:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) creat(&(0x7f0000000300)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000002440)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002480)='./file1\x00', 0x0) 17:14:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:14:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setresgid(0x0, 0x0, 0x0) 17:14:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 17:14:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 17:14:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 17:14:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:14:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) [ 214.225591] kauditd_printk_skb: 4 callbacks suppressed [ 214.225625] audit: type=1326 audit(1529687697.224:267): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14609 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setresgid(0x0, 0x0, 0x0) 17:14:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58000}]}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) [ 214.323257] audit: type=1326 audit(1529687697.290:268): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14620 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:57 executing program 6: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:14:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 17:14:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 17:14:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:14:57 executing program 2: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:14:57 executing program 6: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:14:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 17:14:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 17:14:58 executing program 6: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:14:58 executing program 2: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:14:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 17:14:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:14:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setresgid(0x0, 0x0, 0x0) 17:14:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) [ 215.241565] audit: type=1326 audit(1529687698.240:269): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14666 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:58 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:14:58 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 17:14:58 executing program 2: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:14:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 17:14:58 executing program 0: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) setresgid(0x0, 0x0, 0x0) 17:14:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:14:58 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:14:58 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 17:14:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xe}}, 0x14}, 0x1}, 0x0) 17:14:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) 17:14:59 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:14:59 executing program 0: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) setresgid(0x0, 0x0, 0x0) 17:14:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 17:14:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:14:59 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:14:59 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) [ 216.190150] audit: type=1326 audit(1529687699.188:270): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14709 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:14:59 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:14:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) 17:14:59 executing program 0: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) setresgid(0x0, 0x0, 0x0) 17:14:59 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 17:14:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:14:59 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 17:14:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:14:59 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:15:00 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) setresgid(0x0, 0x0, 0x0) 17:15:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:15:00 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 17:15:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) 17:15:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:15:00 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 17:15:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:15:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') 17:15:00 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) setresgid(0x0, 0x0, 0x0) 17:15:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:15:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:15:00 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 17:15:00 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50001}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 17:15:00 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:15:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) 17:15:00 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) setresgid(0x0, 0x0, 0x0) 17:15:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') 17:15:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:15:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f00000000c0)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:15:00 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 17:15:00 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:15:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 17:15:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) 17:15:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:15:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) setresgid(0x0, 0x0, 0x0) 17:15:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 17:15:00 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:15:00 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 17:15:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:15:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') 17:15:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) 17:15:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) setresgid(0x0, 0x0, 0x0) 17:15:00 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 17:15:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:15:01 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:15:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 17:15:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:15:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') 17:15:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) setresgid(0x0, 0x0, 0x0) 17:15:01 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) 17:15:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:15:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 17:15:01 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:15:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) setresgid(0x0, 0x0, 0x0) 17:15:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:15:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) [ 218.303123] audit: type=1326 audit(1529687701.301:271): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14870 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') 17:15:01 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) 17:15:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) setresgid(0x0, 0x0, 0x0) 17:15:01 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:15:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 17:15:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 17:15:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:15:01 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) 17:15:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') 17:15:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) [ 218.703383] audit: type=1326 audit(1529687701.701:272): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14906 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:15:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:15:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) setresgid(0x0, 0x0, 0x0) 17:15:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50001}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 17:15:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) 17:15:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 17:15:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') [ 219.209344] audit: type=1326 audit(1529687702.207:273): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14926 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 17:15:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 17:15:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) 17:15:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:15:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) setresgid(0x0, 0x0, 0x0) [ 219.396286] audit: type=1326 audit(1529687702.394:274): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14945 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 219.491136] audit: type=1326 audit(1529687702.489:275): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14956 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:15:02 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') 17:15:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 17:15:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 219.636552] audit: type=1326 audit(1529687702.635:276): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14966 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003100), &(0x7f0000003680)=0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x90) 17:15:03 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) 17:15:03 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') 17:15:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:15:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) [ 220.164402] audit: type=1326 audit(1529687703.163:277): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14978 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:03 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') 17:15:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) 17:15:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 17:15:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:15:03 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') 17:15:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) [ 220.208431] audit: type=1326 audit(1529687703.187:278): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14983 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 220.392315] audit: type=1326 audit(1529687703.391:279): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14997 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) setresgid(0x0, 0x0, 0x0) 17:15:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) 17:15:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:15:03 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') 17:15:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) [ 220.526137] audit: type=1326 audit(1529687703.524:280): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15008 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 220.644928] audit: type=1326 audit(1529687703.643:281): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15018 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:15:04 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') 17:15:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) 17:15:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 17:15:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x2000006, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) [ 221.124893] audit: type=1326 audit(1529687704.123:282): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15027 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) 17:15:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') [ 221.161404] audit: type=1326 audit(1529687704.147:283): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15028 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000040)) 17:15:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x2000006, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) 17:15:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') 17:15:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) setresgid(0x0, 0x0, 0x0) 17:15:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) 17:15:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') 17:15:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x2000006, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000240)=""/248) 17:15:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:15:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') 17:15:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x2000006, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) 17:15:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 17:15:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') 17:15:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x2000006, 0x0, 0x0, 0x5020a}]}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') 17:15:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000240)=@add_del={0x2, &(0x7f0000000200)='vcan0\x00'}) 17:15:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x2000006, 0x0, 0x0, 0x5020a}]}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') 17:15:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) 17:15:05 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) 17:15:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x2000006, 0x0, 0x0, 0x5020a}]}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:15:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000180)) 17:15:05 executing program 6: socket(0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:06 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) 17:15:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000040)=0x14) 17:15:06 executing program 6: socket(0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000080)}}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000200)) 17:15:06 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) 17:15:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:06 executing program 6: socket(0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') 17:15:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000080)) 17:15:06 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 17:15:06 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) 17:15:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) memfd_create(&(0x7f0000000040)='md5sum\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x2000006, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:06 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:06 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50203}]}) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) 17:15:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) 17:15:07 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x2000006, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:07 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50203}]}) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) 17:15:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:07 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) memfd_create(&(0x7f0000000040)='md5sum\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x20) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='./file0\x00') 17:15:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) 17:15:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) memfd_create(&(0x7f0000000040)='md5sum\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:07 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50203}]}) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) 17:15:07 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x2000006, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:07 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) [ 224.452693] kauditd_printk_skb: 10 callbacks suppressed [ 224.452716] audit: type=1326 audit(1529687707.451:294): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15236 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)={'mangle\x00'}, &(0x7f0000000040)=0x54) 17:15:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:07 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:07 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) 17:15:07 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) memfd_create(&(0x7f0000000040)='md5sum\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) 17:15:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) rt_sigsuspend(&(0x7f0000000840), 0x8) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x8) 17:15:07 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) 17:15:08 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:08 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) 17:15:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) 17:15:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:15:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/73, &(0x7f0000000140)=0x49) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) 17:15:08 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) 17:15:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:08 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) 17:15:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/73, &(0x7f0000000140)=0x49) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) 17:15:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getpeername(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, &(0x7f0000000200)=0x80) 17:15:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:08 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) 17:15:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:08 executing program 1: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) 17:15:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/73, &(0x7f0000000140)=0x49) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) 17:15:09 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:09 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) 17:15:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[]}, 0x1}, 0x0) 17:15:09 executing program 5: memfd_create(&(0x7f0000000040)='md5sum\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:09 executing program 1: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) 17:15:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/73, &(0x7f0000000140)=0x49) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) 17:15:09 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:09 executing program 1: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:09 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) 17:15:09 executing program 5: memfd_create(&(0x7f0000000040)='md5sum\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:09 executing program 3: socket$inet6(0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) 17:15:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) keyctl$setperm(0x5, 0x0, 0x0) 17:15:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) 17:15:09 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:09 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) 17:15:09 executing program 5: memfd_create(&(0x7f0000000040)='md5sum\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x2000006}]}) socket(0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:09 executing program 3: socket$inet6(0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) 17:15:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x45a, &(0x7f0000001580)=""/134}, 0x48) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000340)=""/55) 17:15:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:09 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) [ 226.826455] audit: type=1326 audit(1529687709.820:295): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15424 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:09 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) memfd_create(&(0x7f0000000040)='md5sum\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:09 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) 17:15:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) 17:15:10 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) epoll_wait(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 17:15:10 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) memfd_create(&(0x7f0000000040)='md5sum\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:10 executing program 3: socket$inet6(0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) 17:15:10 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) 17:15:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x2000006}]}) socket(0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:10 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:10 executing program 7: getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/73, &(0x7f0000000140)=0x49) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) 17:15:10 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) memfd_create(&(0x7f0000000040)='md5sum\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:10 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) 17:15:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:15:10 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) 17:15:10 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) [ 227.785908] audit: type=1326 audit(1529687710.784:296): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15486 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:10 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:10 executing program 7: getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/73, &(0x7f0000000140)=0x49) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) 17:15:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000040)='md5sum\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={0x0, {0x2}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0xab852ebbe6fbd72e, 0x0, 0x0, 0x0, 0x80, &(0x7f00000000c0)='syz^|un\x00', 0x1, 0x4, 0xfffffffffffffffe}) 17:15:11 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) 17:15:11 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) [ 228.154914] audit: type=1326 audit(1529687711.153:297): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15526 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x2000006}]}) socket(0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:11 executing program 7: getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/73, &(0x7f0000000140)=0x49) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) 17:15:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000040)='md5sum\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:11 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 17:15:11 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) [ 228.704719] audit: type=1326 audit(1529687711.703:298): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15537 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 228.747209] audit: type=1326 audit(1529687711.739:299): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15546 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:11 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 17:15:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/73, &(0x7f0000000140)=0x49) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) 17:15:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000040)='md5sum\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) 17:15:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/73, &(0x7f0000000140)=0x49) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) 17:15:12 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 17:15:12 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) [ 229.202324] audit: type=1326 audit(1529687712.200:300): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15584 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) memfd_create(&(0x7f0000000040)='md5sum\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) 17:15:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:12 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:12 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/73, &(0x7f0000000140)=0x49) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) 17:15:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) [ 229.665843] audit: type=1326 audit(1529687712.664:301): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15592 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) memfd_create(&(0x7f0000000040)='md5sum\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:12 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/73, &(0x7f0000000140)=0x49) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) 17:15:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) 17:15:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) [ 229.957360] audit: type=1326 audit(1529687712.956:302): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15616 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) memfd_create(&(0x7f0000000040)='md5sum\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/73, &(0x7f0000000140)=0x49) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) 17:15:13 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0xad, [], 0x0, &(0x7f0000000040), &(0x7f0000000200)=""/173}, &(0x7f00000000c0)=0x78) [ 230.263548] audit: type=1326 audit(1529687713.259:303): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15643 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000040)=""/35) 17:15:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/73, &(0x7f0000000140)=0x49) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) 17:15:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) 17:15:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 17:15:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000040)='md5sum\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) [ 230.615673] audit: type=1326 audit(1529687713.614:304): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15648 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/73, &(0x7f0000000140)=0x49) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) [ 230.671170] audit: type=1326 audit(1529687713.645:305): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15647 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) 17:15:13 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 17:15:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/73, &(0x7f0000000140)=0x49) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) 17:15:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) [ 230.937749] audit: type=1326 audit(1529687713.936:306): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15673 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/73, &(0x7f0000000140)=0x49) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) 17:15:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000040)='md5sum\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:14 executing program 4: socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 17:15:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/73, &(0x7f0000000140)=0x49) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) 17:15:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) 17:15:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f8}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) [ 231.576392] audit: type=1326 audit(1529687714.575:307): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15712 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:14 executing program 4: socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) [ 231.648175] audit: type=1326 audit(1529687714.609:308): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15709 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 231.668081] audit: type=1326 audit(1529687714.637:309): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15707 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:14 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 17:15:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f8}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:14 executing program 4: socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 17:15:14 executing program 6: socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) [ 231.859722] audit: type=1326 audit(1529687714.858:310): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15729 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:14 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 17:15:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) 17:15:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f8}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000040)='md5sum\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:15:15 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 17:15:15 executing program 6: socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) 17:15:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f8}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/73, &(0x7f0000000140)=0x49) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) 17:15:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) 17:15:15 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 17:15:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 17:15:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f8}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:15 executing program 6: socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) 17:15:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(aegis256)\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 17:15:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 17:15:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f8}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:15 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/73, &(0x7f0000000140)=0x49) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000001c0)={0x0, 0x0, 'client0\x00', 0x0, "469b6fb4af05ae25", "6ab4fdf9580ecf570a96b50ce7c5234577a3721a91e6fea46f6e942ea85393df"}) 17:15:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) 17:15:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 17:15:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f8}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000240)) 17:15:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x0, 0x0, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000280), {[{{@arp={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'irlan0\x00', 'yam0\x00'}, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6tnl0\x00', 'ifb0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1}}, {{@arp={@multicast1=0xe0000001, @rand_addr, 0x0, 0x0, @empty, {}, @mac=@random="2a39853d64fe", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ipddp0\x00', 'eql\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4b0) 17:15:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'bond0\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000000)) 17:15:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 17:15:16 executing program 0: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'bond0\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000000)) 17:15:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) 17:15:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) 17:15:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 17:15:16 executing program 0: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) getpid() ioprio_get$pid(0x0, 0x0) 17:15:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'bond0\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000000)) 17:15:17 executing program 2: pipe2(&(0x7f0000000000), 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) 17:15:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 17:15:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) 17:15:17 executing program 0: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) fchdir(0xffffffffffffffff) 17:15:17 executing program 2: pipe2(&(0x7f0000000000), 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) 17:15:17 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f8}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 17:15:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'bond0\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000000)) 17:15:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) 17:15:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) getpid() ioprio_get$pid(0x0, 0x0) [ 234.748086] kauditd_printk_skb: 5 callbacks suppressed [ 234.748110] audit: type=1326 audit(1529687717.733:316): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15914 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) pipe2(&(0x7f00000000c0), 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:17 executing program 2: pipe2(&(0x7f0000000000), 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) 17:15:17 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f8}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x5, 0x90, [0x20000180, 0x0, 0x0, 0x200004f8, 0x20000648], 0x0, &(0x7f0000000000), &(0x7f0000000180)=[{}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x3}]}, 0x108) 17:15:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) 17:15:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) getpid() ioprio_get$pid(0x0, 0x0) 17:15:18 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f8}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) 17:15:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) pipe2(&(0x7f00000000c0), 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) 17:15:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) getpid() ioprio_get$pid(0x0, 0x0) 17:15:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000080)}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) 17:15:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) 17:15:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) pipe2(&(0x7f00000000c0), 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 17:15:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) [ 235.704174] audit: type=1326 audit(1529687718.702:317): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15991 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000080)}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) 17:15:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) 17:15:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioprio_get$pid(0x0, 0x0) 17:15:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) pipe2(&(0x7f00000000c0), 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) 17:15:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000080)}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) 17:15:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 17:15:19 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) 17:15:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioprio_get$pid(0x0, 0x0) 17:15:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f8}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) 17:15:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) [ 236.689399] audit: type=1326 audit(1529687719.687:318): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16045 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) 17:15:19 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) 17:15:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f8}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioprio_get$pid(0x0, 0x0) 17:15:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) 17:15:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:19 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) [ 236.969469] audit: type=1326 audit(1529687719.968:319): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16070 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:20 executing program 3: getpid() ioprio_get$pid(0x0, 0x0) 17:15:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) 17:15:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f8}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:20 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) 17:15:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) 17:15:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000500)={0x0, &(0x7f00000004c0)}, 0x10) 17:15:20 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) 17:15:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) 17:15:20 executing program 3: getpid() ioprio_get$pid(0x0, 0x0) 17:15:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) 17:15:20 executing program 7: pipe2(&(0x7f00000000c0), 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:20 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) [ 237.873120] audit: type=1326 audit(1529687720.871:320): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16108 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 17:15:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) 17:15:20 executing program 3: getpid() ioprio_get$pid(0x0, 0x0) 17:15:21 executing program 7: pipe2(&(0x7f00000000c0), 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) [ 238.038659] audit: type=1326 audit(1529687721.037:321): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16124 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) 17:15:21 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) getpid() ioprio_get$pid(0x0, 0x0) 17:15:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 17:15:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) [ 238.296619] audit: type=1326 audit(1529687721.295:322): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16147 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:21 executing program 7: pipe2(&(0x7f00000000c0), 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:21 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) getpid() ioprio_get$pid(0x0, 0x0) 17:15:21 executing program 5: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) 17:15:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) 17:15:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) [ 238.766129] audit: type=1326 audit(1529687721.764:323): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16157 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x8) 17:15:21 executing program 5: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) 17:15:21 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) getpid() ioprio_get$pid(0x0, 0x0) 17:15:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) 17:15:21 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) pipe2(&(0x7f00000000c0), 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) [ 239.027122] audit: type=1326 audit(1529687722.025:324): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16186 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:22 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) pipe2(&(0x7f00000000c0), 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) getpid() ioprio_get$pid(0x0, 0x0) 17:15:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) 17:15:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) [ 239.298648] audit: type=1326 audit(1529687722.297:325): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16203 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:15:22 executing program 5: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) 17:15:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 17:15:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) getpid() ioprio_get$pid(0x0, 0x0) 17:15:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) 17:15:22 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) pipe2(&(0x7f00000000c0), 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:22 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) 17:15:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) 17:15:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f00000000c0), 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 17:15:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) getpid() ioprio_get$pid(0x0, 0x0) 17:15:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) 17:15:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) 17:15:23 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) 17:15:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f00000000c0), 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) [ 240.122231] kauditd_printk_skb: 1 callbacks suppressed [ 240.122255] audit: type=1326 audit(1529687723.097:327): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16241 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000a00)={'irlan0\x00'}) [ 240.263681] audit: type=1326 audit(1529687723.262:328): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16254 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 17:15:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) getpid() ioprio_get$pid(0x0, 0x0) 17:15:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 17:15:23 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) 17:15:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f00000000c0), 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) prctl$setendian(0x14, 0x0) 17:15:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) 17:15:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) getpid() ioprio_get$pid(0x0, 0x0) 17:15:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) pipe2(&(0x7f00000000c0), 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:23 executing program 4: mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 17:15:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) prctl$setendian(0x14, 0x0) 17:15:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 17:15:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) 17:15:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) getpid() ioprio_get$pid(0x0, 0x0) 17:15:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) [ 241.093853] audit: type=1326 audit(1529687724.092:329): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16303 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) 17:15:24 executing program 4: mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 17:15:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) pipe2(&(0x7f00000000c0), 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 17:15:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) prctl$setendian(0x14, 0x0) 17:15:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) ptrace(0xffffffffffffffff, 0x0) 17:15:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) getpid() ioprio_get$pid(0x0, 0x0) [ 241.224577] audit: type=1326 audit(1529687724.223:330): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16313 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) 17:15:24 executing program 4: mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 17:15:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) pipe2(&(0x7f00000000c0), 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) prctl$setendian(0x14, 0x0) 17:15:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 17:15:24 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 17:15:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f00000000c0), 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/160) 17:15:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50205}]}) prctl$setendian(0x14, 0x0) 17:15:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) 17:15:24 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 17:15:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 17:15:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setgid(0x0) [ 242.027921] audit: type=1326 audit(1529687725.026:331): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16350 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:25 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) [ 242.101979] audit: type=1326 audit(1529687725.082:332): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16364 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) getpid() ioprio_get$pid(0x0, 0x0) 17:15:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) 17:15:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 17:15:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50205}]}) prctl$setendian(0x14, 0x0) 17:15:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) [ 242.228282] audit: type=1326 audit(1529687725.224:333): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16372 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setgid(0x0) 17:15:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6}]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) 17:15:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) [ 242.446922] audit: type=1326 audit(1529687725.445:334): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16390 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f00000000c0), 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:25 executing program 6: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 17:15:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 17:15:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50205}]}) prctl$setendian(0x14, 0x0) 17:15:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setgid(0x0) 17:15:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x501f7}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f00000000c0)={0x8}, 0x0) [ 242.945134] audit: type=1326 audit(1529687725.943:335): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16400 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 17:15:26 executing program 6: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 17:15:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) getpid() ioprio_get$pid(0x0, 0x0) 17:15:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setgid(0x0) 17:15:26 executing program 1: r0 = socket$inet6(0xa, 0x202000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@local={0xfe, 0x80, [], 0xaa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000280)={@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x20) 17:15:26 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) prctl$setendian(0x14, 0x0) 17:15:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 17:15:26 executing program 6: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) [ 243.286300] audit: type=1326 audit(1529687726.284:336): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16431 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:26 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) prctl$setendian(0x14, 0x0) 17:15:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6}]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) 17:15:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setgid(0x0) 17:15:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f00000000c0), 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) 17:15:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) 17:15:26 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 17:15:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 17:15:26 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) prctl$setendian(0x14, 0x0) 17:15:26 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) prctl$setendian(0x14, 0x0) 17:15:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 17:15:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 17:15:27 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 17:15:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setgid(0x0) 17:15:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) prctl$setendian(0x14, 0x0) 17:15:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) 17:15:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) pipe(&(0x7f0000000240)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:27 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 17:15:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6}]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/239) 17:15:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) prctl$setendian(0x14, 0x0) 17:15:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) 17:15:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setgid(0x0) 17:15:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 17:15:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) pipe(&(0x7f0000000240)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) prctl$setendian(0x14, 0x0) 17:15:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000240)) 17:15:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) prctl$setendian(0x14, 0x0) 17:15:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 17:15:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 17:15:28 executing program 2: nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setgid(0x0) 17:15:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) 17:15:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) pipe(&(0x7f0000000240)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000240)) 17:15:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) prctl$setendian(0x14, 0x0) [ 245.204928] kauditd_printk_skb: 4 callbacks suppressed [ 245.204949] audit: type=1326 audit(1529687728.203:341): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16542 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) pipe(&(0x7f0000000240)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:28 executing program 2: nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setgid(0x0) 17:15:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) prctl$setendian(0x14, 0x0) 17:15:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 17:15:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f8}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) 17:15:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) 17:15:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) rt_sigaction(0x0, &(0x7f0000000200), &(0x7f0000000040), 0x1, &(0x7f00000000c0)) set_robust_list(&(0x7f00000014c0)={&(0x7f0000000300)={&(0x7f00000002c0)}, 0x0, &(0x7f0000001480)={&(0x7f0000000340)}}, 0x18) 17:15:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 17:15:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) prctl$setendian(0x14, 0x0) 17:15:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f8}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) 17:15:29 executing program 2: nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setgid(0x0) 17:15:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) 17:15:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 17:15:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 17:15:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) prctl$setendian(0x14, 0x0) 17:15:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setgid(0x0) [ 246.176171] audit: type=1326 audit(1529687729.174:342): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16600 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) prctl$setendian(0x14, 0x0) 17:15:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 17:15:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f8}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) 17:15:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) [ 246.336489] audit: type=1326 audit(1529687729.333:343): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16609 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setgid(0x0) 17:15:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) [ 246.563511] audit: type=1326 audit(1529687729.562:344): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16628 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:30 executing program 1: socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) 17:15:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f8}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) 17:15:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:30 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setgid(0x0) 17:15:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:15:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setgid(0x0) 17:15:30 executing program 1: socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) 17:15:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) prctl$setendian(0x14, 0x0) 17:15:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f8}]}) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) 17:15:30 executing program 3: pipe(&(0x7f0000000240)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:30 executing program 1: socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) 17:15:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setgid(0x0) 17:15:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) [ 247.387589] audit: type=1326 audit(1529687730.386:345): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16668 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 17:15:30 executing program 3: pipe(&(0x7f0000000240)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f8}]}) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) 17:15:30 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) 17:15:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setgid(0x0) [ 247.622003] audit: type=1326 audit(1529687730.620:346): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16687 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:30 executing program 3: pipe(&(0x7f0000000240)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:15:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f8}]}) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) 17:15:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) prctl$setendian(0x14, 0x0) 17:15:31 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) 17:15:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setgid(0x0) 17:15:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:31 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) pipe(&(0x7f0000000240)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:15:31 executing program 7: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) [ 248.333908] audit: type=1326 audit(1529687731.332:347): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16715 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 17:15:31 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) 17:15:31 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) pipe(&(0x7f0000000240)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:31 executing program 7: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) 17:15:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setgid(0x0) 17:15:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:15:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) [ 248.611628] audit: type=1326 audit(1529687731.609:348): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16749 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setgid(0x0) 17:15:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setgid(0x0) 17:15:32 executing program 7: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) 17:15:32 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) pipe(&(0x7f0000000240)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:32 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:15:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) 17:15:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) [ 249.301514] audit: type=1326 audit(1529687732.300:349): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16772 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:15:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) 17:15:32 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f8}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) 17:15:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) 17:15:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000240)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:32 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000200)) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) 17:15:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000240)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) 17:15:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000240)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:33 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:33 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f8}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) 17:15:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000200)) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) 17:15:33 executing program 4: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:15:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setgid(0x0) 17:15:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) 17:15:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) [ 250.286952] audit: type=1326 audit(1529687733.285:350): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16835 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:33 executing program 4: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:15:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) pipe(&(0x7f0000000240)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) 17:15:33 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f8}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) 17:15:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000200)) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) 17:15:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) 17:15:33 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) 17:15:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000080)}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) [ 250.675929] audit: type=1326 audit(1529687733.674:351): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16862 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setgid(0x0) 17:15:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) pipe(&(0x7f0000000240)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:34 executing program 4: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:15:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000200)) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) 17:15:34 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) 17:15:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000080)}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) [ 251.227564] audit: type=1326 audit(1529687734.226:352): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16874 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) 17:15:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$void(0xffffffffffffffff, 0x0) 17:15:34 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:15:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000080)}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) 17:15:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) pipe(&(0x7f0000000240)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:34 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) 17:15:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f8}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) 17:15:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) [ 251.680801] audit: type=1326 audit(1529687734.679:353): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16919 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f8}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) 17:15:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$void(0xffffffffffffffff, 0x0) 17:15:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000240)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:35 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:15:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) 17:15:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000000)) 17:15:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) [ 252.174307] audit: type=1326 audit(1529687735.173:354): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16928 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f8}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) 17:15:35 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:15:35 executing program 6: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000200)) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) 17:15:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$void(0xffffffffffffffff, 0x0) 17:15:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 17:15:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:15:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) [ 252.534962] audit: type=1326 audit(1529687735.530:355): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16965 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000), 0x10) 17:15:35 executing program 0: socket$inet6(0xa, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) 17:15:35 executing program 6: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000200)) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) [ 252.684179] audit: type=1326 audit(1529687735.671:356): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16977 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000240)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) 17:15:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 17:15:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:15:36 executing program 6: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000200)) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) 17:15:36 executing program 0: socket$inet6(0xa, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) [ 253.116781] audit: type=1326 audit(1529687736.115:357): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16987 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:15:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000200)) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) 17:15:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 17:15:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:36 executing program 0: socket$inet6(0xa, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) 17:15:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:15:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) 17:15:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000200)) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) [ 253.533256] audit: type=1326 audit(1529687736.531:358): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17029 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000200)) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) 17:15:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 17:15:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 17:15:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:37 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) 17:15:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000200)) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) 17:15:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:15:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000240)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/89) [ 254.096185] audit: type=1326 audit(1529687737.094:359): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17058 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:15:37 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) 17:15:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000200)) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) 17:15:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 17:15:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000000c0)) 17:15:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:15:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000200)) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) 17:15:37 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) 17:15:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 17:15:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000200)) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) 17:15:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) 17:15:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:38 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, 0x0) 17:15:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000200)) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) 17:15:38 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 17:15:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) restart_syscall() 17:15:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) 17:15:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) restart_syscall() 17:15:38 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 17:15:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 17:15:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) [ 255.513166] kauditd_printk_skb: 3 callbacks suppressed [ 255.513186] audit: type=1326 audit(1529687738.511:363): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17146 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000200)) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) 17:15:38 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) 17:15:38 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 17:15:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) restart_syscall() 17:15:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) [ 255.960013] audit: type=1326 audit(1529687738.958:364): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17164 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000200)) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) 17:15:39 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 17:15:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) 17:15:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) restart_syscall() [ 256.187485] audit: type=1326 audit(1529687739.186:365): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17185 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:39 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) 17:15:39 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 17:15:39 executing program 1: sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) [ 256.542679] audit: type=1326 audit(1529687739.540:366): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17214 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) clone(0x0, &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)) 17:15:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) 17:15:39 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) 17:15:39 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 17:15:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) rt_sigreturn() 17:15:39 executing program 1: sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:39 executing program 1: sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) [ 256.936657] audit: type=1326 audit(1529687739.935:367): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17227 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000200)) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) 17:15:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 17:15:40 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) rt_sigreturn() 17:15:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) 17:15:40 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) [ 257.179266] audit: type=1326 audit(1529687740.177:368): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17246 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:40 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) [ 257.263200] audit: type=1326 audit(1529687740.239:369): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17255 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 17:15:40 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) 17:15:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) rt_sigreturn() 17:15:40 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 17:15:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 17:15:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) rt_sigreturn() 17:15:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000200)) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000040)=0x8) 17:15:41 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) 17:15:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) 17:15:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 17:15:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) rt_sigreturn() 17:15:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) [ 258.207274] audit: type=1326 audit(1529687741.206:370): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17301 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:41 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) [ 258.279160] audit: type=1326 audit(1529687741.246:371): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17310 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) rt_sigreturn() [ 258.347609] audit: type=1326 audit(1529687741.323:372): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17315 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) rt_sigreturn() 17:15:41 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) 17:15:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:41 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) 17:15:41 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) rt_sigreturn() 17:15:42 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) 17:15:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:42 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) rt_sigreturn() 17:15:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) 17:15:42 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) rt_sigreturn() 17:15:42 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) 17:15:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 17:15:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:42 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) rt_sigreturn() 17:15:42 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) 17:15:42 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) rt_sigreturn() 17:15:42 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) 17:15:42 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) rt_sigreturn() 17:15:42 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) 17:15:42 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) 17:15:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) rt_sigreturn() 17:15:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) rt_sigreturn() 17:15:42 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) 17:15:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) close(0xffffffffffffffff) 17:15:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) close(0xffffffffffffffff) 17:15:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) 17:15:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 17:15:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) rt_sigreturn() 17:15:43 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) 17:15:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:15:43 executing program 4: 17:15:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) 17:15:43 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) 17:15:43 executing program 4: 17:15:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) rt_sigreturn() 17:15:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) 17:15:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:15:43 executing program 4: 17:15:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) rt_sigreturn() 17:15:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/222, 0xde, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:15:44 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) 17:15:44 executing program 4: 17:15:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) 17:15:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) rt_sigreturn() 17:15:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:44 executing program 2: 17:15:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) [ 261.309002] kauditd_printk_skb: 5 callbacks suppressed [ 261.314475] audit: type=1326 audit(1529687744.307:378): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17473 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:44 executing program 2: 17:15:44 executing program 4: 17:15:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) rt_sigreturn() 17:15:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:44 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) 17:15:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) prctl$setptracer(0x59616d61, 0x0) [ 261.525695] audit: type=1326 audit(1529687744.524:379): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17490 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:44 executing program 2: 17:15:44 executing program 4: [ 261.624070] audit: type=1326 audit(1529687744.566:380): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17494 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:45 executing program 4: 17:15:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:15:45 executing program 2: 17:15:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) prctl$setptracer(0x59616d61, 0x0) 17:15:45 executing program 1: 17:15:45 executing program 4: 17:15:45 executing program 2: 17:15:45 executing program 1: 17:15:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:15:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) rt_sigreturn() 17:15:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) prctl$setptracer(0x59616d61, 0x0) 17:15:45 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) 17:15:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:45 executing program 4: 17:15:45 executing program 2: [ 262.514462] audit: type=1326 audit(1529687745.513:381): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17535 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:45 executing program 1: 17:15:45 executing program 6: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) 17:15:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:15:45 executing program 2: [ 262.666722] audit: type=1326 audit(1529687745.665:382): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17547 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:45 executing program 4: 17:15:45 executing program 1: 17:15:45 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:45 executing program 6: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) 17:15:45 executing program 1: 17:15:45 executing program 2: 17:15:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) rt_sigreturn() 17:15:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) [ 263.321373] audit: type=1326 audit(1529687746.320:383): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17581 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:46 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x24) 17:15:46 executing program 4: 17:15:46 executing program 1: 17:15:46 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:46 executing program 6: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) 17:15:46 executing program 2: 17:15:46 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:15:46 executing program 4: 17:15:46 executing program 1: [ 263.626400] audit: type=1326 audit(1529687746.625:384): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17595 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:46 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:15:46 executing program 2: 17:15:46 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) 17:15:46 executing program 5: socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:46 executing program 4: 17:15:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:47 executing program 1: 17:15:47 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:15:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) 17:15:47 executing program 2: 17:15:47 executing program 3: 17:15:47 executing program 4: 17:15:47 executing program 1: 17:15:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:47 executing program 7: 17:15:47 executing program 3: 17:15:47 executing program 2: 17:15:47 executing program 1: 17:15:47 executing program 4: 17:15:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) 17:15:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:47 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:15:47 executing program 7: 17:15:47 executing program 3: 17:15:47 executing program 4: 17:15:47 executing program 1: 17:15:47 executing program 2: 17:15:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) 17:15:47 executing program 7: 17:15:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:48 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:15:48 executing program 4: 17:15:48 executing program 3: 17:15:48 executing program 1: 17:15:48 executing program 2: 17:15:48 executing program 7: 17:15:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) 17:15:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:48 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:15:48 executing program 4: 17:15:48 executing program 1: 17:15:48 executing program 3: 17:15:48 executing program 7: 17:15:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) 17:15:48 executing program 2: 17:15:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:15:48 executing program 4: 17:15:48 executing program 3: 17:15:48 executing program 7: 17:15:48 executing program 1: 17:15:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) 17:15:48 executing program 2: 17:15:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:15:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:48 executing program 4: 17:15:48 executing program 3: 17:15:48 executing program 7: 17:15:48 executing program 1: 17:15:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) 17:15:48 executing program 2: 17:15:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:48 executing program 1: 17:15:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:15:49 executing program 4: 17:15:49 executing program 7: 17:15:49 executing program 3: 17:15:49 executing program 2: 17:15:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) 17:15:49 executing program 4: 17:15:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:15:49 executing program 1: 17:15:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:49 executing program 7: 17:15:49 executing program 3: 17:15:49 executing program 2: 17:15:49 executing program 4: 17:15:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) 17:15:49 executing program 1: 17:15:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:15:49 executing program 7: 17:15:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:49 executing program 3: 17:15:49 executing program 2: [ 266.516722] audit: type=1326 audit(1529687749.515:385): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17787 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:49 executing program 4: 17:15:49 executing program 1: [ 266.644201] audit: type=1326 audit(1529687749.619:386): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17796 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:49 executing program 7: 17:15:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:15:49 executing program 3: 17:15:49 executing program 2: 17:15:49 executing program 4: 17:15:49 executing program 1: 17:15:49 executing program 2: 17:15:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) 17:15:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:15:50 executing program 3: 17:15:50 executing program 7: [ 267.419222] audit: type=1326 audit(1529687750.417:387): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17829 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 267.456423] audit: type=1326 audit(1529687750.438:388): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17834 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:50 executing program 4: 17:15:50 executing program 2: 17:15:50 executing program 1: 17:15:50 executing program 3: 17:15:50 executing program 7: 17:15:50 executing program 4: 17:15:50 executing program 7: [ 267.593322] audit: type=1326 audit(1529687750.591:389): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17844 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:50 executing program 1: 17:15:50 executing program 2: 17:15:50 executing program 3: 17:15:50 executing program 1: 17:15:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) prctl$setptracer(0x59616d61, 0x0) 17:15:51 executing program 7: 17:15:51 executing program 2: 17:15:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) [ 268.388278] audit: type=1326 audit(1529687751.387:390): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17867 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) 17:15:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) listxattr(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)=""/171, 0xab) 17:15:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:15:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) socket(0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 17:15:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='bic\x00', 0x4) 17:15:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) [ 268.530713] audit: type=1326 audit(1529687751.529:391): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17882 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 268.586692] audit: type=1326 audit(1529687751.581:392): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17888 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 17:15:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) 17:15:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) 17:15:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000140)=0xc) 17:15:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000067c0)=""/244, &(0x7f0000006600)=0xf4) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) 17:15:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) 17:15:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 17:15:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x2000000000000006, 0x0, 0x0, 0x50000}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fanotify_init(0x0, 0x0) 17:15:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000500), &(0x7f0000000580)=0x14) 17:15:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_fuseblk_mount(&(0x7f00000027c0)='./file1\x00', &(0x7f0000002800)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000000)=@kern={0x10}, 0xc) 17:15:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 17:15:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 17:15:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) 17:15:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 17:15:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x2000000000000006, 0x0, 0x0, 0x50000}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fanotify_init(0x0, 0x0) [ 269.601993] audit: type=1326 audit(1529687752.600:393): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17941 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) 17:15:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 17:15:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:15:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) 17:15:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x2000000000000006, 0x0, 0x0, 0x50000}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fanotify_init(0x0, 0x0) 17:15:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 17:15:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) 17:15:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioperm(0x0, 0x0, 0x0) 17:15:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x2000000000000006, 0x0, 0x0, 0x50000}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fanotify_init(0x0, 0x0) 17:15:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 17:15:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 17:15:53 executing program 4: socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) 17:15:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioperm(0x0, 0x0, 0x0) 17:15:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) 17:15:53 executing program 4: socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) 17:15:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioperm(0x0, 0x0, 0x0) 17:15:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x2000000000000006, 0x0, 0x0, 0x50000}]}) fanotify_init(0x0, 0x0) 17:15:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 17:15:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 17:15:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_fuseblk_mount(&(0x7f00000027c0)='./file1\x00', &(0x7f0000002800)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) 17:15:53 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 17:15:53 executing program 4: socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) 17:15:53 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x2000000000000006, 0x0, 0x0, 0x50000}]}) fanotify_init(0x0, 0x0) 17:15:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 17:15:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 17:15:54 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 17:15:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x2000000000000006, 0x0, 0x0, 0x50000}]}) getuid() getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000340)={'broute\x00'}, &(0x7f00000003c0)=0x50) 17:15:54 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) 17:15:54 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 17:15:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x2000000000000006, 0x0, 0x0, 0x50000}]}) fanotify_init(0x0, 0x0) 17:15:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 17:15:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 17:15:54 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) 17:15:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x2000000000000006, 0x0, 0x0, 0x50000}]}) getuid() getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000340)={'broute\x00'}, &(0x7f00000003c0)=0x50) 17:15:54 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:54 executing program 7: fcntl$getown(0xffffffffffffff9c, 0x9) fanotify_init(0x0, 0x0) 17:15:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 17:15:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50000}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 17:15:54 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:54 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) 17:15:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 17:15:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x2000000000000006, 0x0, 0x0, 0x50000}]}) getuid() getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000340)={'broute\x00'}, &(0x7f00000003c0)=0x50) 17:15:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:54 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x2000000000000006, 0x0, 0x0, 0x50000}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fanotify_init(0x0, 0x0) 17:15:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioperm(0x0, 0x0, 0x0) 17:15:54 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 17:15:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) 17:15:54 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 17:15:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) fcntl$getown(0xffffffffffffff9c, 0x9) fanotify_init(0x0, 0x0) [ 272.104750] audit: type=1326 audit(1529687755.102:394): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18139 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:55 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 17:15:55 executing program 6: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x2000000000000006, 0x0, 0x0, 0x50000}]}) getuid() getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000340)={'broute\x00'}, &(0x7f00000003c0)=0x50) 17:15:55 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) 17:15:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 17:15:55 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 17:15:55 executing program 6: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50000}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fanotify_init(0x0, 0x0) 17:15:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) 17:15:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) 17:15:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:55 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 17:15:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x2000000000000006, 0x0, 0x0, 0x50000}]}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000340)={'broute\x00'}, &(0x7f00000003c0)=0x50) 17:15:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x2000000000000006}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fanotify_init(0x0, 0x0) 17:15:55 executing program 6: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:55 executing program 2: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) [ 273.011962] audit: type=1326 audit(1529687756.010:395): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18199 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:56 executing program 2: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 17:15:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:56 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 17:15:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) 17:15:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x2000000000000006, 0x0, 0x0, 0x50000}]}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000340)={'broute\x00'}, &(0x7f00000003c0)=0x50) 17:15:56 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 17:15:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:56 executing program 2: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 17:15:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) 17:15:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x2000000000000006, 0x0, 0x0, 0x50000}]}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000340)={'broute\x00'}, &(0x7f00000003c0)=0x50) 17:15:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 17:15:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) 17:15:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 17:15:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:56 executing program 0: getuid() getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000340)={'broute\x00'}, &(0x7f00000003c0)=0x50) 17:15:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 17:15:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) [ 273.945166] audit: type=1326 audit(1529687756.942:396): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18265 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:57 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x2000000000000006, 0x0, 0x0, 0x50000}]}) getuid() getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000340)={'broute\x00'}, &(0x7f00000003c0)=0x50) 17:15:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 17:15:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 17:15:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getuid() getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000340)={'broute\x00'}, &(0x7f00000003c0)=0x50) 17:15:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) [ 274.249169] audit: type=1326 audit(1529687757.247:397): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18293 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) 17:15:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 17:15:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50000}]}) getuid() getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000340)={'broute\x00'}, &(0x7f00000003c0)=0x50) 17:15:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 17:15:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_fuseblk_mount(&(0x7f00000027c0)='./file1\x00', &(0x7f0000002800)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000580)) 17:15:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040), 0x8) clock_settime(0x0, &(0x7f0000000000)) [ 274.866086] audit: type=1326 audit(1529687757.864:398): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18309 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x2000000000000006}]}) getuid() getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000340)={'broute\x00'}, &(0x7f00000003c0)=0x50) 17:15:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 17:15:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) [ 275.038241] audit: type=1326 audit(1529687758.036:399): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18326 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x2000000000000006, 0x0, 0x0, 0x50000}]}) getuid() write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='threaded\x00', 0x9) 17:15:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040), 0x8) clock_settime(0x0, &(0x7f0000000000)) 17:15:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) [ 275.261632] audit: type=1326 audit(1529687758.260:400): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18346 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 275.313862] audit: type=1326 audit(1529687758.309:401): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18353 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003600)=0x14) 17:15:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 17:15:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:15:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040), 0x8) clock_settime(0x0, &(0x7f0000000000)) 17:15:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) [ 275.828055] audit: type=1326 audit(1529687758.826:402): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18366 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 17:15:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040), 0x8) clock_settime(0x0, &(0x7f0000000000)) [ 275.894875] audit: type=1326 audit(1529687758.893:403): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18372 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:15:59 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc0a85320, &(0x7f0000000280)) 17:15:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:15:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 17:15:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) clock_settime(0x0, &(0x7f0000000000)) 17:15:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 17:15:59 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc0a85320, &(0x7f0000000280)) 17:15:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 17:15:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:15:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) clock_settime(0x0, &(0x7f0000000000)) 17:15:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 17:15:59 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc0a85320, &(0x7f0000000280)) 17:15:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:15:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) 17:15:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:15:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 17:15:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) clock_settime(0x0, &(0x7f0000000000)) 17:15:59 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc0a85320, &(0x7f0000000280)) 17:15:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:16:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) 17:16:00 executing program 7: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040), 0x8) clock_settime(0x0, &(0x7f0000000000)) 17:16:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:16:00 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc0a85320, &(0x7f0000000280)) 17:16:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) 17:16:00 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040), 0x8) clock_settime(0x0, &(0x7f0000000000)) 17:16:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 17:16:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 277.304925] kauditd_printk_skb: 4 callbacks suppressed [ 277.304946] audit: type=1326 audit(1529687760.303:408): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18453 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:00 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc0a85320, &(0x7f0000000280)) 17:16:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:16:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040), 0x8) clock_settime(0x0, &(0x7f0000000000)) 17:16:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 17:16:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) 17:16:00 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x90) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000180), 0x4) 17:16:00 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc0a85320, &(0x7f0000000280)) 17:16:00 executing program 1: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:16:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50000}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040), 0x8) clock_settime(0x0, &(0x7f0000000000)) 17:16:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) [ 277.891715] audit: type=1326 audit(1529687760.890:409): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18486 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:00 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x90) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000180), 0x4) 17:16:00 executing program 1: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:16:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040), 0x8) clock_settime(0x0, &(0x7f0000000000)) 17:16:00 executing program 0: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000280)) [ 277.975264] audit: type=1326 audit(1529687760.922:410): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18494 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 278.086192] audit: type=1326 audit(1529687761.054:411): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18505 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:01 executing program 0: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000280)) 17:16:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) keyctl$get_persistent(0x16, 0x0, 0x0) 17:16:01 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x90) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000180), 0x4) 17:16:01 executing program 1: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:16:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:16:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_fuse_mount(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 17:16:01 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x90) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000180), 0x4) 17:16:01 executing program 0: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000280)) 17:16:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) keyctl$get_persistent(0x16, 0x0, 0x0) 17:16:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) [ 278.844516] audit: type=1326 audit(1529687761.843:412): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18536 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:01 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc0a85320, &(0x7f0000000280)) 17:16:01 executing program 3: setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000180), 0x4) 17:16:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:16:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) keyctl$get_persistent(0x16, 0x0, 0x0) 17:16:02 executing program 3: setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000180), 0x4) 17:16:02 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc0a85320, &(0x7f0000000280)) 17:16:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:16:02 executing program 3: setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000180), 0x4) 17:16:02 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) 17:16:02 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000418f50)={{}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc0a85320, &(0x7f0000000280)) 17:16:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:16:02 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) 17:16:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:16:02 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000280)) 17:16:02 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000280)) 17:16:02 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) 17:16:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:16:02 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000280)) 17:16:02 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) 17:16:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:16:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:16:02 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) 17:16:03 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) 17:16:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:16:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) [ 280.086004] audit: type=1326 audit(1529687763.084:413): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18622 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) 17:16:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) 17:16:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) 17:16:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) 17:16:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x58000}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) 17:16:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) 17:16:03 executing program 5: setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000012c0)={0x0, @in={{0x2}}}, 0x98) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000040), 0x4) 17:16:03 executing program 7: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:16:03 executing program 6: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000100)=""/187) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f00000000c0)) 17:16:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, "71756575653000000000000000000000400000000000000000000002000d9d00000000000000000000000000000000000000000000c52e9f052d68eaa500"}) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000008c0)) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000200)) 17:16:03 executing program 2: 17:16:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000240)) [ 280.364355] audit: type=1326 audit(1529687763.362:414): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18643 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, "71756575653000000000000000000000400000000000000000000002000d9d00000000000000000000000000000000000000000000c52e9f052d68eaa500"}) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000008c0)) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000200)) 17:16:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:16:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) syz_open_dev$urandom(&(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') 17:16:03 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 17:16:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'os2.', '!\x00'}, &(0x7f00000000c0)=""/193, 0xc1) 17:16:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, "71756575653000000000000000000000400000000000000000000002000d9d00000000000000000000000000000000000000000000c52e9f052d68eaa500"}) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000008c0)) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000200)) 17:16:03 executing program 6: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000100)=""/187) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f00000000c0)) 17:16:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) [ 281.075241] audit: type=1326 audit(1529687764.073:415): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18682 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) 17:16:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, "71756575653000000000000000000000400000000000000000000002000d9d00000000000000000000000000000000000000000000c52e9f052d68eaa500"}) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000008c0)) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000200)) 17:16:04 executing program 6: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000100)=""/187) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f00000000c0)) 17:16:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) rt_sigreturn() 17:16:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:04 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) 17:16:04 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) [ 281.374468] audit: type=1326 audit(1529687764.371:416): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18711 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, "71756575653000000000000000000000400000000000000000000002000d9d00000000000000000000000000000000000000000000c52e9f052d68eaa500"}) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000200)) 17:16:04 executing program 6: r0 = socket(0x10, 0x2, 0x9) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a") sendfile(r0, r1, &(0x7f00000000c0), 0x80000002) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000280)) ioprio_get$pid(0x1, 0x0) 17:16:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:16:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:04 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 17:16:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) rt_sigreturn() 17:16:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, "71756575653000000000000000000000400000000000000000000002000d9d00000000000000000000000000000000000000000000c52e9f052d68eaa500"}) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000200)) 17:16:04 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) 17:16:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) [ 282.053775] audit: type=1326 audit(1529687765.052:417): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18744 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) keyctl$get_persistent(0x16, 0x0, 0x0) 17:16:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, "71756575653000000000000000000000400000000000000000000002000d9d00000000000000000000000000000000000000000000c52e9f052d68eaa500"}) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000200)) 17:16:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) rt_sigreturn() 17:16:05 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) 17:16:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) 17:16:05 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) [ 282.363903] audit: type=1326 audit(1529687765.362:418): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18767 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000008c0)) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000200)) 17:16:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) 17:16:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) rt_sigreturn() 17:16:05 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) 17:16:05 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 17:16:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000008c0)) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000200)) 17:16:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) inotify_init1(0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=@random={'security.', '/dev/rtc0\x00'}, &(0x7f0000000180)=""/65, 0x41) 17:16:06 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) socket$inet6(0xa, 0x0, 0x0) 17:16:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) rt_sigreturn() 17:16:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) 17:16:06 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 17:16:06 executing program 2: msgget(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000008c0)) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000200)) 17:16:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:16:06 executing program 2: msgget(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:06 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 17:16:06 executing program 3: ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, "71756575653000000000000000000000400000000000000000000002000d9d00000000000000000000000000000000000000000000c52e9f052d68eaa500"}) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f00000008c0)) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000200)) 17:16:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) rt_sigreturn() 17:16:06 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) socket$inet6(0xa, 0x0, 0x0) 17:16:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) 17:16:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:16:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:06 executing program 2: msgget(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:06 executing program 3: ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, "71756575653000000000000000000000400000000000000000000002000d9d00000000000000000000000000000000000000000000c52e9f052d68eaa500"}) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f00000008c0)) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000200)) 17:16:06 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) socket$inet6(0xa, 0x0, 0x0) 17:16:06 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 17:16:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) rt_sigreturn() 17:16:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) 17:16:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:06 executing program 3: ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, "71756575653000000000000000000000400000000000000000000002000d9d00000000000000000000000000000000000000000000c52e9f052d68eaa500"}) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f00000008c0)) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000200)) 17:16:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:16:07 executing program 5: socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) 17:16:07 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 17:16:07 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) rt_sigreturn() 17:16:07 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) 17:16:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, "71756575653000000000000000000000400000000000000000000002000d9d00000000000000000000000000000000000000000000c52e9f052d68eaa500"}) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000008c0)) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000200)) 17:16:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:16:07 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) rt_sigreturn() 17:16:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:07 executing program 5: socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) 17:16:07 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:07 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 17:16:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, "71756575653000000000000000000000400000000000000000000002000d9d00000000000000000000000000000000000000000000c52e9f052d68eaa500"}) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000008c0)) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000200)) 17:16:07 executing program 6: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) 17:16:07 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) rt_sigreturn() 17:16:07 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 17:16:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000040)}) msgget(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:07 executing program 5: socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) 17:16:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:07 executing program 6: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) 17:16:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:16:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, "71756575653000000000000000000000400000000000000000000002000d9d00000000000000000000000000000000000000000000c52e9f052d68eaa500"}) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000008c0)) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000200)) 17:16:07 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) rt_sigreturn() 17:16:07 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 17:16:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000040)}) msgget(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:07 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) 17:16:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:07 executing program 6: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) 17:16:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, "71756575653000000000000000000000400000000000000000000002000d9d00000000000000000000000000000000000000000000c52e9f052d68eaa500"}) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f00000008c0)) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000200)) 17:16:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:16:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000040)}) msgget(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:08 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) 17:16:08 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) rt_sigreturn() 17:16:08 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 17:16:08 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) 17:16:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, "71756575653000000000000000000000400000000000000000000002000d9d00000000000000000000000000000000000000000000c52e9f052d68eaa500"}) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f00000008c0)) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000200)) 17:16:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:16:08 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) 17:16:08 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) rt_sigreturn() 17:16:08 executing program 1: socket(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, "71756575653000000000000000000000400000000000000000000002000d9d00000000000000000000000000000000000000000000c52e9f052d68eaa500"}) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f00000008c0)) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000200)) 17:16:08 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 17:16:08 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) 17:16:08 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:16:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) rt_sigreturn() 17:16:08 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) 17:16:08 executing program 1: socket(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, "71756575653000000000000000000000400000000000000000000002000d9d00000000000000000000000000000000000000000000c52e9f052d68eaa500"}) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000008c0)) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000200)) 17:16:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:08 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 17:16:08 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:16:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) rt_sigreturn() 17:16:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) 17:16:08 executing program 1: socket(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:08 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) 17:16:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, "71756575653000000000000000000000400000000000000000000002000d9d00000000000000000000000000000000000000000000c52e9f052d68eaa500"}) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000008c0)) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000200)) 17:16:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:08 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 17:16:09 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:16:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) rt_sigreturn() 17:16:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) 17:16:09 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, "71756575653000000000000000000000400000000000000000000002000d9d00000000000000000000000000000000000000000000c52e9f052d68eaa500"}) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000008c0)) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000200)) 17:16:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6}]}) msgget(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:09 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 17:16:09 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) 17:16:09 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:16:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) rt_sigreturn() 17:16:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) [ 286.320974] audit: type=1326 audit(1529687769.319:419): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19095 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') 17:16:09 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:09 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 17:16:09 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:16:09 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) 17:16:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) rt_sigreturn() 17:16:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) 17:16:09 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) tgkill(0x0, 0x0, 0x0) 17:16:09 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 17:16:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6}]}) msgget(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:10 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:16:10 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) 17:16:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) rt_sigreturn() 17:16:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) 17:16:10 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 17:16:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) tgkill(0x0, 0x0, 0x0) [ 287.242187] audit: type=1326 audit(1529687770.240:420): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19156 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) 17:16:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) [ 287.324346] audit: type=1326 audit(1529687770.304:421): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19171 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) rt_sigreturn() 17:16:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) tgkill(0x0, 0x0, 0x0) 17:16:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:10 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) [ 287.464194] audit: type=1326 audit(1529687770.460:422): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19178 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) 17:16:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) [ 287.660543] audit: type=1326 audit(1529687770.659:423): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19197 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6}]}) msgget(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 17:16:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) tgkill(0x0, 0x0, 0x0) 17:16:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:16:11 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) 17:16:11 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) [ 288.235590] audit: type=1326 audit(1529687771.234:424): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19208 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) rt_sigreturn() [ 288.293789] audit: type=1326 audit(1529687771.290:425): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19222 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:16:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:11 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) [ 288.418312] audit: type=1326 audit(1529687771.415:426): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19227 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) tgkill(0x0, 0x0, 0x0) 17:16:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) [ 288.506912] audit: type=1326 audit(1529687771.505:427): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19237 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) [ 288.653077] audit: type=1326 audit(1529687771.651:428): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19246 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) tgkill(0x0, 0x0, 0x0) 17:16:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:16:12 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) 17:16:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:16:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) tgkill(0x0, 0x0, 0x0) 17:16:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) 17:16:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) rt_sigreturn() [ 289.239678] audit: type=1326 audit(1529687772.238:429): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19271 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 289.320283] audit: type=1326 audit(1529687772.299:430): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19270 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:12 executing program 3: socket$netlink(0x10, 0x3, 0x0) tgkill(0x0, 0x0, 0x0) [ 289.361767] audit: type=1326 audit(1529687772.353:431): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19280 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') 17:16:12 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) 17:16:12 executing program 3: socket$netlink(0x10, 0x3, 0x0) tgkill(0x0, 0x0, 0x0) 17:16:12 executing program 3: socket$netlink(0x10, 0x3, 0x0) tgkill(0x0, 0x0, 0x0) 17:16:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000180)) 17:16:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$inet6_tcp(0xa, 0x1, 0x0) times(&(0x7f00000003c0)) 17:16:12 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) tgkill(0x0, 0x0, 0x0) 17:16:12 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) tgkill(0x0, 0x0, 0x0) 17:16:13 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000000)) 17:16:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) lstat(&(0x7f0000000200)='/\x00', &(0x7f0000000240)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x4) 17:16:13 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) tgkill(0x0, 0x0, 0x0) 17:16:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:16:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) 17:16:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) socket$netlink(0x10, 0x3, 0x0) tgkill(0x0, 0x0, 0x0) 17:16:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) syz_emit_ethernet(0x2a, &(0x7f00000004c0)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @loopback=0x7f000001, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @multicast2=0xe0000002}}}}, &(0x7f0000000500)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) 17:16:13 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) 17:16:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='dummy0\x00'}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) socket$netlink(0x10, 0x3, 0x0) tgkill(0x0, 0x0, 0x0) 17:16:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) syz_emit_ethernet(0x2a, &(0x7f00000004c0)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @loopback=0x7f000001, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @multicast2=0xe0000002}}}}, &(0x7f0000000500)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:13 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 17:16:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) socket$netlink(0x10, 0x3, 0x0) tgkill(0x0, 0x0, 0x0) 17:16:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) 17:16:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='dummy0\x00'}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) syz_emit_ethernet(0x2a, &(0x7f00000004c0)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @loopback=0x7f000001, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @multicast2=0xe0000002}}}}, &(0x7f0000000500)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) migrate_pages(0x0, 0x0, &(0x7f0000000540), &(0x7f0000000580)) 17:16:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:16:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) tgkill(0x0, 0x0, 0x0) 17:16:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) 17:16:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) 17:16:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) syz_emit_ethernet(0x2a, &(0x7f00000004c0)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @loopback=0x7f000001, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @multicast2=0xe0000002}}}}, &(0x7f0000000500)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='dummy0\x00'}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 17:16:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) tgkill(0x0, 0x0, 0x0) 17:16:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) 17:16:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='dummy0\x00'}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 17:16:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) socket$netlink(0x10, 0x3, 0x0) tgkill(0x0, 0x0, 0x0) 17:16:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) 17:16:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 17:16:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 17:16:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 17:16:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 17:16:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) tgkill(0x0, 0x0, 0x0) 17:16:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) 17:16:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 17:16:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:15 executing program 2: syz_emit_ethernet(0x2a, &(0x7f00000004c0)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @loopback=0x7f000001, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @multicast2=0xe0000002}}}}, &(0x7f0000000500)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:15 executing program 7: socket$nl_generic(0x10, 0x3, 0x10) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) 17:16:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 17:16:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 17:16:15 executing program 0: ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='dummy0\x00'}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:15 executing program 7: socket$nl_generic(0x10, 0x3, 0x10) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) 17:16:15 executing program 2: syz_emit_ethernet(0x2a, &(0x7f00000004c0)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @loopback=0x7f000001, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @multicast2=0xe0000002}}}}, &(0x7f0000000500)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 17:16:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 17:16:15 executing program 0: ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='dummy0\x00'}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) tgkill(0x0, 0x0, 0x0) 17:16:16 executing program 7: socket$nl_generic(0x10, 0x3, 0x10) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) 17:16:16 executing program 2: syz_emit_ethernet(0x2a, &(0x7f00000004c0)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @loopback=0x7f000001, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @multicast2=0xe0000002}}}}, &(0x7f0000000500)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 17:16:16 executing program 0: ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='dummy0\x00'}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 17:16:16 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) [ 293.293264] kauditd_printk_skb: 9 callbacks suppressed [ 293.293286] audit: type=1326 audit(1529687776.291:441): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19515 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:16 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='dummy0\x00'}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) syz_emit_ethernet(0x2a, &(0x7f00000004c0)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @loopback=0x7f000001, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @multicast2=0xe0000002}}}}, &(0x7f0000000500)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 17:16:16 executing program 5: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 17:16:16 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='dummy0\x00'}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) syz_emit_ethernet(0x2a, &(0x7f00000004c0)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @loopback=0x7f000001, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @multicast2=0xe0000002}}}}, &(0x7f0000000500)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:16 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) 17:16:16 executing program 5: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 17:16:16 executing program 6: ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 17:16:17 executing program 6: ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 17:16:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) tgkill(0x0, 0x0, 0x0) 17:16:17 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='dummy0\x00'}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:17 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) 17:16:17 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000000c0)={@empty, @remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}}) 17:16:17 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) syz_emit_ethernet(0x2a, &(0x7f00000004c0)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @loopback=0x7f000001, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @multicast2=0xe0000002}}}}, &(0x7f0000000500)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:17 executing program 5: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) [ 294.269094] audit: type=1326 audit(1529687777.267:442): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19573 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='dummy0\x00'}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) 17:16:17 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 17:16:17 executing program 6: ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 17:16:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) syz_emit_ethernet(0x2a, &(0x7f00000004c0)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @loopback=0x7f000001, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @multicast2=0xe0000002}}}}, &(0x7f0000000500)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:17 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000000c0)={@empty, @remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}}) 17:16:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='dummy0\x00'}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:17 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 17:16:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='dummy0\x00'}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) 17:16:18 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 17:16:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) syz_emit_ethernet(0x2a, &(0x7f00000004c0)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @loopback=0x7f000001, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @multicast2=0xe0000002}}}}, &(0x7f0000000500)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) listen(0xffffffffffffffff, 0x0) 17:16:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:16:18 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 17:16:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 17:16:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='dummy0\x00'}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) 17:16:18 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 17:16:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) syz_emit_ethernet(0x2a, &(0x7f00000004c0)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @loopback=0x7f000001, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @multicast2=0xe0000002}}}}, &(0x7f0000000500)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:16:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 17:16:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) listen(0xffffffffffffffff, 0x0) 17:16:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) syz_emit_ethernet(0x2a, &(0x7f00000004c0)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @loopback=0x7f000001, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @multicast2=0xe0000002}}}}, &(0x7f0000000500)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='dummy0\x00'}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:18 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 17:16:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) 17:16:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 17:16:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:16:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) listen(0xffffffffffffffff, 0x0) 17:16:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) syz_emit_ethernet(0x2a, &(0x7f00000004c0)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @loopback=0x7f000001, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @multicast2=0xe0000002}}}}, &(0x7f0000000500)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 17:16:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='dummy0\x00'}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) 17:16:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 17:16:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:16:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) listen(0xffffffffffffffff, 0x0) 17:16:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 17:16:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) syz_emit_ethernet(0x2a, &(0x7f00000004c0)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @loopback=0x7f000001, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @multicast2=0xe0000002}}}}, &(0x7f0000000500)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='dummy0\x00'}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) 17:16:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) [ 296.254315] audit: type=1326 audit(1529687779.252:443): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19711 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) listen(0xffffffffffffffff, 0x0) 17:16:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 17:16:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_emit_ethernet(0x2a, &(0x7f00000004c0)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @loopback=0x7f000001, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @multicast2=0xe0000002}}}}, &(0x7f0000000500)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:16:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) [ 296.439566] audit: type=1326 audit(1529687779.437:444): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19727 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) [ 296.498123] audit: type=1326 audit(1529687779.491:445): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19734 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 17:16:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) listen(0xffffffffffffffff, 0x0) 17:16:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:16:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 17:16:19 executing program 4: accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) [ 296.733604] audit: type=1326 audit(1529687779.732:446): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19750 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='dummy0\x00'}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) listen(0xffffffffffffffff, 0x0) 17:16:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:16:20 executing program 4: accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 17:16:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) [ 297.218184] audit: type=1326 audit(1529687780.216:447): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19771 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 297.305654] audit: type=1326 audit(1529687780.304:448): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19778 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_emit_ethernet(0x2a, &(0x7f00000004c0)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @loopback=0x7f000001, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @multicast2=0xe0000002}}}}, &(0x7f0000000500)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:20 executing program 4: accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) 17:16:20 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) listen(0xffffffffffffffff, 0x0) 17:16:20 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) [ 297.391739] audit: type=1326 audit(1529687780.390:449): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19784 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:20 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:20 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) [ 297.475086] audit: type=1326 audit(1529687780.473:450): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19791 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 17:16:20 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) listen(0xffffffffffffffff, 0x0) 17:16:20 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='dummy0\x00'}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/74) 17:16:21 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:16:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:21 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) listen(0xffffffffffffffff, 0x0) 17:16:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 17:16:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_emit_ethernet(0x2a, &(0x7f00000004c0)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @loopback=0x7f000001, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @multicast2=0xe0000002}}}}, &(0x7f0000000500)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 17:16:21 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) [ 298.319168] kauditd_printk_skb: 2 callbacks suppressed [ 298.319191] audit: type=1326 audit(1529687781.317:453): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19831 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_generic(0x10, 0x3, 0x10) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)}) 17:16:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) listen(0xffffffffffffffff, 0x0) 17:16:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:21 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) [ 298.412204] audit: type=1326 audit(1529687781.410:454): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19837 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) listen(0xffffffffffffffff, 0x0) [ 298.483870] audit: type=1326 audit(1529687781.482:455): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19844 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) 17:16:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:21 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) [ 298.681076] audit: type=1326 audit(1529687781.679:456): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19859 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:22 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) listen(0xffffffffffffffff, 0x0) 17:16:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:16:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, @local}, &(0x7f0000000280)=0x1c) 17:16:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) listen(0xffffffffffffffff, 0x0) 17:16:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 17:16:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) listen(0xffffffffffffffff, 0x0) 17:16:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) [ 299.317282] audit: type=1326 audit(1529687782.315:457): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19884 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:16:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sched_getparam(0x0, &(0x7f0000000140)) 17:16:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 17:16:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) listen(0xffffffffffffffff, 0x0) 17:16:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:16:22 executing program 7: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000100)) umount2(&(0x7f00000000c0)='./file0\x00', 0x400000000000004) syz_open_dev$tun(&(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000001c0)={"0000060000000002000000ffff070001"}) umount2(&(0x7f0000000040)='./file0\x00', 0x4) syncfs(0xffffffffffffffff) 17:16:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) listen(0xffffffffffffffff, 0x0) 17:16:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:22 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000140)={{}, 'port0\x00'}) [ 299.657506] audit: type=1326 audit(1529687782.656:458): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19912 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) listen(0xffffffffffffffff, 0x0) 17:16:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:16:23 executing program 0: r0 = memfd_create(&(0x7f000003e000)='\'', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000001000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = memfd_create(&(0x7f00008effff)='\t', 0x0) r4 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000000)) dup2(r4, r3) write$sndseq(r3, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 17:16:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) listen(0xffffffffffffffff, 0x0) 17:16:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='netort_cache\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 17:16:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) 17:16:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) listen(0xffffffffffffffff, 0x0) 17:16:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:16:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') [ 300.417823] audit: type=1326 audit(1529687783.416:459): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19961 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:16:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) 17:16:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pptp={0x0, 0x0, {0x0, @multicast1}}, &(0x7f0000000140)=0x80) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) [ 300.690096] audit: type=1326 audit(1529687783.688:460): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19986 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:16:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) 17:16:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) [ 300.814990] audit: type=1326 audit(1529687783.813:461): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19991 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pptp={0x0, 0x0, {0x0, @multicast1}}, &(0x7f0000000140)=0x80) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) 17:16:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) listen(0xffffffffffffffff, 0x0) 17:16:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) 17:16:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) [ 301.359529] audit: type=1326 audit(1529687784.357:462): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20021 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0', [], 0xa}, 0xb) 17:16:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pptp={0x0, 0x0, {0x0, @multicast1}}, &(0x7f0000000140)=0x80) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) 17:16:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) 17:16:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:16:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) 17:16:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pptp={0x0, 0x0, {0x0, @multicast1}}, &(0x7f0000000140)=0x80) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) 17:16:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) 17:16:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) listen(0xffffffffffffffff, 0x0) 17:16:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:25 executing program 5: syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) 17:16:25 executing program 6: syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) 17:16:25 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:25 executing program 4: ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000001340)) 17:16:25 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:16:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:25 executing program 5: syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:25 executing program 6: syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) 17:16:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) 17:16:25 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') setns(r2, 0x0) 17:16:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) 17:16:26 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:26 executing program 5: syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) dup(0xffffffffffffff9c) uselib(&(0x7f0000000040)='./file0\x00') 17:16:26 executing program 6: syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) 17:16:26 executing program 7: ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:26 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) 17:16:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:26 executing program 7: ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:26 executing program 0: accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pptp={0x0, 0x0, {0x0, @multicast1}}, &(0x7f0000000140)=0x80) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) 17:16:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) sched_getscheduler(0x0) 17:16:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:26 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) 17:16:26 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) 17:16:26 executing program 7: ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:27 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:27 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:27 executing program 0: accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pptp={0x0, 0x0, {0x0, @multicast1}}, &(0x7f0000000140)=0x80) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) 17:16:27 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) 17:16:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) sched_getscheduler(0x0) 17:16:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:27 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) 17:16:27 executing program 0: accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pptp={0x0, 0x0, {0x0, @multicast1}}, &(0x7f0000000140)=0x80) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) 17:16:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) 17:16:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:27 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) sched_getscheduler(0x0) 17:16:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:27 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) 17:16:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) 17:16:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pptp={0x0, 0x0, {0x0, @multicast1}}, &(0x7f0000000140)=0x80) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) 17:16:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:27 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) 17:16:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pptp={0x0, 0x0, {0x0, @multicast1}}, &(0x7f0000000140)=0x80) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) 17:16:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) sched_getscheduler(0x0) 17:16:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:27 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:27 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) 17:16:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pptp={0x0, 0x0, {0x0, @multicast1}}, &(0x7f0000000140)=0x80) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) 17:16:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) 17:16:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) sched_getscheduler(0x0) 17:16:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:28 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) 17:16:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) 17:16:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pptp={0x0, 0x0, {0x0, @multicast1}}, &(0x7f0000000140)=0x80) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) 17:16:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) sched_getscheduler(0x0) 17:16:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) 17:16:28 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) 17:16:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pptp={0x0, 0x0, {0x0, @multicast1}}, &(0x7f0000000140)=0x80) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) 17:16:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:28 executing program 4: nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) sched_getscheduler(0x0) 17:16:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) 17:16:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:28 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) 17:16:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pptp={0x0, 0x0, {0x0, @multicast1}}, &(0x7f0000000140)=0x80) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) [ 305.710363] kauditd_printk_skb: 4 callbacks suppressed [ 305.710384] audit: type=1326 audit(1529687788.709:467): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20326 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:28 executing program 4: nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) [ 305.848835] audit: type=1326 audit(1529687788.845:468): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20336 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pptp={0x0, 0x0, {0x0, @multicast1}}, &(0x7f0000000140)=0x80) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) 17:16:28 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) sched_getscheduler(0x0) 17:16:28 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) [ 305.928614] audit: type=1326 audit(1529687788.925:469): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20344 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:29 executing program 4: nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:29 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) sched_getscheduler(0x0) 17:16:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pptp={0x0, 0x0, {0x0, @multicast1}}, &(0x7f0000000140)=0x80) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) 17:16:29 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) 17:16:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) [ 306.634288] audit: type=1326 audit(1529687789.633:470): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20383 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pptp={0x0, 0x0, {0x0, @multicast1}}, &(0x7f0000000140)=0x80) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) 17:16:29 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) [ 306.792815] audit: type=1326 audit(1529687789.791:471): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20393 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:29 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) sched_getscheduler(0x0) 17:16:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pptp={0x0, 0x0, {0x0, @multicast1}}, &(0x7f0000000140)=0x80) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) 17:16:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:29 executing program 3: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) [ 306.890145] audit: type=1326 audit(1529687789.885:472): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20399 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 306.910088] audit: type=1326 audit(1529687789.888:473): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20398 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:29 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) sched_getscheduler(0x0) 17:16:30 executing program 3: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) [ 306.957637] audit: type=1326 audit(1529687789.955:474): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20409 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:30 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:30 executing program 3: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) 17:16:30 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) sched_getscheduler(0x0) 17:16:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) [ 307.601047] audit: type=1326 audit(1529687790.599:475): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20432 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x0) 17:16:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:30 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) 17:16:30 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) sched_getscheduler(0x0) [ 307.746006] audit: type=1326 audit(1529687790.743:476): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20443 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) 17:16:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) sched_getscheduler(0x0) 17:16:30 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) 17:16:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pptp={0x0, 0x0, {0x0, @multicast1}}, &(0x7f0000000140)=0x80) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) 17:16:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) sched_getscheduler(0x0) 17:16:31 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) 17:16:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) sched_getscheduler(0x0) 17:16:31 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) 17:16:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:31 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) 17:16:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) sched_getscheduler(0x0) 17:16:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='system.posix_acl_access\x00', &(0x7f00000000c0)='\x00', 0x1, 0x0) 17:16:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:16:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) fsetxattr(0xffffffffffffffff, &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000000180)='\x00', 0x1, 0x0) 17:16:31 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) 17:16:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) sched_getscheduler(0x0) 17:16:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pptp={0x0, 0x0, {0x0, @multicast1}}, &(0x7f0000000140)=0x80) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr}, 0xc) 17:16:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) 17:16:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:32 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) 17:16:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) sched_getscheduler(0x0) 17:16:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) 17:16:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) sched_getscheduler(0x0) 17:16:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, &(0x7f00000000c0)=0xfffffffffffffe20) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 17:16:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001380)) 17:16:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:32 executing program 7: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="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", 0x0, 0x0) getdents(r0, &(0x7f0000000400)=""/135, 0x74) 17:16:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) 17:16:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:33 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) 17:16:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:33 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:16:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) sched_getscheduler(0x0) 17:16:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) 17:16:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:33 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:16:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) 17:16:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000140), 0x4) 17:16:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) [ 310.998378] kauditd_printk_skb: 11 callbacks suppressed [ 310.998405] audit: type=1326 audit(1529687793.996:488): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20640 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:34 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)={0x303, 0x33}, 0x4) 17:16:34 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:16:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) [ 311.121809] audit: type=1326 audit(1529687794.120:489): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20651 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) sched_getscheduler(0x0) 17:16:34 executing program 5: accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:34 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) fanotify_init(0x0, 0x0) 17:16:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:34 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 311.299213] audit: type=1326 audit(1529687794.297:490): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20660 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:34 executing program 5: accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:34 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) fanotify_init(0x0, 0x0) 17:16:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:34 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:16:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) fanotify_init(0x0, 0x0) 17:16:35 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:35 executing program 5: accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000180)) 17:16:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) times(&(0x7f00000000c0)) 17:16:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:35 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:16:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:16:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:35 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:35 executing program 7: syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) 17:16:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) 17:16:35 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:35 executing program 6: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:35 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:16:35 executing program 7: syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) 17:16:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 17:16:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) 17:16:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) times(&(0x7f00000000c0)) 17:16:35 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:35 executing program 6: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:35 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:16:35 executing program 7: syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) 17:16:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) times(&(0x7f00000000c0)) 17:16:35 executing program 6: pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) 17:16:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 17:16:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:35 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:16:35 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) 17:16:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) times(&(0x7f00000000c0)) 17:16:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) 17:16:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 17:16:36 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:16:36 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) 17:16:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) 17:16:36 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:16:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) times(&(0x7f00000000c0)) 17:16:36 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) 17:16:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 17:16:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:36 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:16:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) 17:16:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) 17:16:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 17:16:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) times(&(0x7f00000000c0)) 17:16:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) 17:16:36 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:16:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) 17:16:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000c}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) times(&(0x7f00000000c0)) 17:16:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 17:16:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) 17:16:37 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) 17:16:37 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:16:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:37 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) times(&(0x7f00000000c0)) 17:16:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) 17:16:37 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) [ 314.368198] audit: type=1326 audit(1529687797.366:491): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20912 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 17:16:37 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 314.472373] audit: type=1326 audit(1529687797.445:492): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20917 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:37 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) times(&(0x7f00000000c0)) 17:16:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) 17:16:37 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) 17:16:37 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 17:16:37 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) times(&(0x7f00000000c0)) 17:16:37 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:16:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) 17:16:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:37 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) 17:16:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:38 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 17:16:38 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) times(&(0x7f00000000c0)) 17:16:38 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:16:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) 17:16:38 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) 17:16:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) [ 315.279633] audit: type=1326 audit(1529687798.278:493): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20969 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 315.347652] audit: type=1326 audit(1529687798.346:494): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20973 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:38 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 17:16:38 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) times(&(0x7f00000000c0)) [ 315.426195] audit: type=1326 audit(1529687798.423:495): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20977 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:38 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:16:38 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) 17:16:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 17:16:38 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) times(&(0x7f00000000c0)) 17:16:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) [ 315.635718] audit: type=1326 audit(1529687798.633:496): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21000 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 17:16:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/73) 17:16:39 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 17:16:39 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 17:16:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) times(&(0x7f00000000c0)) [ 316.219445] audit: type=1326 audit(1529687799.218:497): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21019 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) 17:16:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) [ 316.306113] audit: type=1326 audit(1529687799.304:498): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21026 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) times(&(0x7f00000000c0)) 17:16:39 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 17:16:39 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 316.377559] audit: type=1326 audit(1529687799.376:499): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21033 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 316.485738] audit: type=1326 audit(1529687799.484:500): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21043 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) 17:16:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 17:16:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) times(&(0x7f00000000c0)) 17:16:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 17:16:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) times(&(0x7f00000000c0)) [ 316.631122] audit: type=1326 audit(1529687799.629:501): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21055 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 17:16:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 17:16:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) 17:16:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) times(&(0x7f00000000c0)) 17:16:40 executing program 5: getpgrp(0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x1, 0x0, 0x6) 17:16:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) 17:16:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in=@dev, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xffffff72) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000380)=0x24) 17:16:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) 17:16:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) times(&(0x7f00000000c0)) 17:16:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 317.417895] audit: type=1326 audit(1529687800.416:502): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21089 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 317.497784] audit: type=1326 audit(1529687800.489:503): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21100 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz1'}, 0x4) 17:16:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 17:16:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000240)=@abs, 0x6e) 17:16:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) 17:16:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) times(&(0x7f00000000c0)) 17:16:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in=@dev, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xffffff72) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000380)=0x24) 17:16:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) [ 317.618401] audit: type=1326 audit(1529687800.615:504): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21106 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 17:16:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in=@dev, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xffffff72) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000380)=0x24) [ 317.687954] audit: type=1326 audit(1529687800.639:505): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21108 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 317.748854] audit: type=1326 audit(1529687800.708:506): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21118 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:16:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000240)=@abs, 0x6e) 17:16:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x14, 0x0, 0x0, 0x0, 0x0, {0x9}}, 0x14}, 0x1}, 0x0) 17:16:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000240)=@abs, 0x6e) 17:16:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in=@dev, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xffffff72) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000380)=0x24) 17:16:41 executing program 7: stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000020307031dfffd946fa2830020200a00090005000000001f0c1ba3a204000400", 0x24}], 0x1}, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/netlink\x00') ftruncate(0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000640)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005b00)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000005c00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005f40)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000005f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000005fc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006000)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000006080)=@hci, &(0x7f0000006100)=0x80) [ 318.367755] ================================================================== [ 318.375183] BUG: KMSAN: uninit-value in nfqnl_recv_config+0x939/0x17d0 [ 318.381861] CPU: 1 PID: 21143 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 318.388686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.398046] Call Trace: [ 318.400647] dump_stack+0x185/0x1d0 [ 318.404276] kmsan_report+0x188/0x2a0 [ 318.408093] __msan_warning_32+0x70/0xc0 [ 318.412157] nfqnl_recv_config+0x939/0x17d0 17:16:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000240)=@abs, 0x6e) [ 318.416477] ? mutex_lock+0x31/0x90 [ 318.420115] ? nfqnl_recv_verdict+0x2330/0x2330 [ 318.424783] nfnetlink_rcv_msg+0xb2e/0xc80 [ 318.429032] netlink_rcv_skb+0x37e/0x600 [ 318.433103] ? nfnetlink_bind+0x1d0/0x1d0 [ 318.437257] nfnetlink_rcv+0x2fe/0x680 [ 318.441153] ? nfnetlink_net_exit_batch+0x270/0x270 [ 318.446179] netlink_unicast+0x1680/0x1750 [ 318.450424] ? nfnetlink_net_exit_batch+0x270/0x270 [ 318.455443] netlink_sendmsg+0x104f/0x1350 [ 318.459691] ? netlink_getsockopt+0xc60/0xc60 [ 318.464189] ___sys_sendmsg+0xec8/0x1320 [ 318.468259] ? __fdget+0x4e/0x60 [ 318.471627] ? __fget_light+0x57/0x700 [ 318.475510] ? __fdget+0x4e/0x60 [ 318.478886] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 318.484254] ? __fget_light+0x6a3/0x700 [ 318.488243] __x64_sys_sendmsg+0x331/0x460 [ 318.492486] ? ___sys_sendmsg+0x1320/0x1320 [ 318.496806] do_syscall_64+0x15b/0x230 [ 318.500690] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 318.505861] RIP: 0033:0x455a99 [ 318.509035] RSP: 002b:00007fe9aa25fc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 318.516726] RAX: ffffffffffffffda RBX: 00007fe9aa2606d4 RCX: 0000000000455a99 [ 318.523977] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 318.531232] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 318.538484] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 318.545735] R13: 00000000004c0b56 R14: 00000000004d0998 R15: 0000000000000000 [ 318.552991] [ 318.554603] Uninit was created at: [ 318.558148] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 318.563236] kmsan_kmalloc+0x94/0x100 [ 318.567025] kmsan_slab_alloc+0x10/0x20 [ 318.570989] __kmalloc_node_track_caller+0xb35/0x11b0 [ 318.576177] __alloc_skb+0x2cb/0x9e0 [ 318.579874] netlink_sendmsg+0x76e/0x1350 [ 318.584005] ___sys_sendmsg+0xec8/0x1320 [ 318.588050] __x64_sys_sendmsg+0x331/0x460 [ 318.592285] do_syscall_64+0x15b/0x230 [ 318.596160] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 318.601325] ================================================================== [ 318.608670] Disabling lock debugging due to kernel taint [ 318.614100] Kernel panic - not syncing: panic_on_warn set ... [ 318.614100] [ 318.621448] CPU: 1 PID: 21143 Comm: syz-executor7 Tainted: G B 4.17.0+ #9 [ 318.629681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.639016] Call Trace: [ 318.641598] dump_stack+0x185/0x1d0 [ 318.645210] panic+0x3d0/0x990 [ 318.648399] kmsan_report+0x29e/0x2a0 [ 318.652187] __msan_warning_32+0x70/0xc0 [ 318.656235] nfqnl_recv_config+0x939/0x17d0 [ 318.660537] ? mutex_lock+0x31/0x90 [ 318.664153] ? nfqnl_recv_verdict+0x2330/0x2330 [ 318.668806] nfnetlink_rcv_msg+0xb2e/0xc80 [ 318.673040] netlink_rcv_skb+0x37e/0x600 [ 318.677092] ? nfnetlink_bind+0x1d0/0x1d0 [ 318.681228] nfnetlink_rcv+0x2fe/0x680 [ 318.685101] ? nfnetlink_net_exit_batch+0x270/0x270 [ 318.690102] netlink_unicast+0x1680/0x1750 [ 318.694326] ? nfnetlink_net_exit_batch+0x270/0x270 [ 318.699330] netlink_sendmsg+0x104f/0x1350 [ 318.703554] ? netlink_getsockopt+0xc60/0xc60 [ 318.708032] ___sys_sendmsg+0xec8/0x1320 [ 318.712085] ? __fdget+0x4e/0x60 [ 318.715437] ? __fget_light+0x57/0x700 [ 318.719320] ? __fdget+0x4e/0x60 [ 318.722670] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 318.728028] ? __fget_light+0x6a3/0x700 [ 318.731990] __x64_sys_sendmsg+0x331/0x460 [ 318.736218] ? ___sys_sendmsg+0x1320/0x1320 [ 318.740523] do_syscall_64+0x15b/0x230 [ 318.744408] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 318.749576] RIP: 0033:0x455a99 [ 318.752748] RSP: 002b:00007fe9aa25fc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 318.760446] RAX: ffffffffffffffda RBX: 00007fe9aa2606d4 RCX: 0000000000455a99 [ 318.767700] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 318.774949] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 318.782200] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 318.789450] R13: 00000000004c0b56 R14: 00000000004d0998 R15: 0000000000000000 [ 318.797253] Dumping ftrace buffer: [ 318.800786] (ftrace buffer empty) [ 318.804472] Kernel Offset: disabled [ 318.808077] Rebooting in 86400 seconds..