v/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, 0x0, 0xfffffffffffffffd) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0xc01, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x1, 0x0) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000080)={0x0, r2}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0xb00]}}}]}, 0x30}}, 0x0) [ 825.120759] audit: type=1326 audit(1545075495.935:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=32581 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x3f00]}}}]}, 0x70}}, 0x0) 19:38:16 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x410001, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000540)=""/138) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r3, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r2, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) recvmsg$kcm(r4, &(0x7f0000000880)={&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000740)=[{&(0x7f0000000600)=""/44, 0x2c}, {&(0x7f0000000640)=""/200, 0xc8}], 0x2, &(0x7f0000000780)=""/228, 0xe4}, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r4, 0xae44, 0xbe71) flock(r2, 0xc) exit(0x7f) 19:38:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x500000000000000]}}}]}, 0x30}}, 0x0) 19:38:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x800000000000000]}}}]}, 0x70}}, 0x0) 19:38:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0xb00000000000000]}}}]}, 0x30}}, 0x0) 19:38:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0xf0ffffff00000000]}}}]}, 0x30}}, 0x0) [ 825.821880] audit: type=1326 audit(1545075496.645:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=32575 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 825.914601] audit: type=1326 audit(1545075496.735:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=32581 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x3f000000]}}}]}, 0x70}}, 0x0) 19:38:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x1001000000000000]}}}]}, 0x30}}, 0x0) 19:38:16 executing program 5: seccomp(0x1, 0x8004000000000000, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 826.063946] audit: type=1326 audit(1545075496.885:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=32620 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 826.113898] audit: type=1326 audit(1545075496.905:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=32622 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:17 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, 0x0, 0xfffffffffffffffd) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0xc01, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x1, 0x0) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000080)={0x0, r2}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0xfffff000]}}}]}, 0x30}}, 0x0) 19:38:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0xffffff7f]}}}]}, 0x70}}, 0x0) 19:38:17 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x1, 0x2) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video36\x00', 0x2, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm-monitor\x00', 0x82200, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000580)='/dev/adsp#\x00', 0x80000001, 0x202540) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r3, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB='tdusted.\a\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r4, 0xae44, 0xbe71) fsetxattr$security_selinux(r3, &(0x7f00000005c0)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x2) flock(r2, 0xc) exit(0x7f) 19:38:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0xf0ffff]}}}]}, 0x30}}, 0x0) 19:38:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x4]}}}]}, 0x70}}, 0x0) 19:38:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x1001]}}}]}, 0x30}}, 0x0) 19:38:17 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001040)={{{@in6=@local, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f0000001140)=0xe8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, [], r1}, 0x48) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r3, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r2, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r4, 0xae44, 0xbe71) flock(r2, 0xc) exit(0x7f) [ 826.854431] audit: type=1326 audit(1545075497.675:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=32620 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 826.909965] audit: type=1326 audit(1545075497.705:597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=32622 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x110]}}}]}, 0x30}}, 0x0) 19:38:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x3f00000000000000]}}}]}, 0x70}}, 0x0) 19:38:17 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, 0x0, 0xfffffffffffffffd) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0xc01, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x1, 0x0) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000080)={0x0, r2}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:17 executing program 5: seccomp(0x1, 0x4000000, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0xf0ffffffffffff]}}}]}, 0x30}}, 0x0) [ 827.075578] IPVS: ftp: loaded support on port[0] = 21 19:38:17 executing program 5: seccomp(0x1, 0x2000000, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x80ffffff00000000]}}}]}, 0x70}}, 0x0) 19:38:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x3f00000000000000]}}}]}, 0x30}}, 0x0) 19:38:18 executing program 5: seccomp(0x1, 0x3000000, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:18 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0xca6, 0x200200) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000380)=0x1fe000000000000, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r3, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) epoll_create1(0x80000) fsetxattr(r2, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r4, 0xae44, 0xbe71) flock(r2, 0xc) exit(0x7f) 19:38:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x40030000000000]}}}]}, 0x70}}, 0x0) 19:38:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x1200]}}}]}, 0x30}}, 0x0) 19:38:18 executing program 5: seccomp(0x1, 0x7a00, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x1000000]}}}]}, 0x70}}, 0x0) 19:38:18 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, 0x0, 0xfffffffffffffffd) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0xc01, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x1, 0x0) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000080)={0x0, r2}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:18 executing program 5: seccomp(0x1, 0x200000000000000, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 827.994159] IPVS: ftp: loaded support on port[0] = 21 19:38:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x1100000000000000]}}}]}, 0x30}}, 0x0) 19:38:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x4000000]}}}]}, 0x70}}, 0x0) 19:38:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0xa000000]}}}]}, 0x30}}, 0x0) 19:38:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x11000000]}}}]}, 0x30}}, 0x0) 19:38:19 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="747275337465642e2c6d643573759c3d366d001502101eb659bce0971008c41a65c1212a64e091f8683abfeeab9dbe2899b1e332e7eca8ece1e3fb9bef123c2993f8232ff80ee284a87ff00607288ee4eddaa93c3411f103f52f85eeb9c334ebf68d1d64d7e5632c6b9263eb36db2f175a1b5b1af1b129d25f02837f22b40449eadefe37d9a88f1ef97aa4d5ee49656aadbaad6170689ff1a4ddaca6d36c7f9930eb132d274161e88908882ae12bcd04433648bece7000000000"], &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0xbe71) flock(r1, 0xc) r4 = semget$private(0x0, 0x3, 0x20) semctl$GETPID(r4, 0x1, 0xb, &(0x7f0000000600)=""/147) exit(0x7f) 19:38:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x2000000]}}}]}, 0x70}}, 0x0) 19:38:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x84, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x600]}}}]}, 0x30}}, 0x0) 19:38:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x2]}}}]}, 0x70}}, 0x0) 19:38:19 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, 0x0, 0xfffffffffffffffd) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0xc01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x1, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000080)={0x0, r1}) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x13]}}}]}, 0x30}}, 0x0) [ 828.910018] IPVS: ftp: loaded support on port[0] = 21 19:38:19 executing program 5: seccomp(0x1, 0x6, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x60, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x8]}}}]}, 0x70}}, 0x0) 19:38:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x10000000]}}}]}, 0x30}}, 0x0) 19:38:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0xf0ffffff]}}}]}, 0x30}}, 0x0) 19:38:20 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000000000712600000000000035060000ff000000bf25000000000000070500000e0000000f65000000000000bf5400000000000007040000040000003d4301000000000095000000000000006154000000000000bf250000000000000f65000000000000070500000e000000bf5400000000000007040000040000003d43010000000000950000000000000061540000000000006b25000000000000070500000e0000000f65000000000000070500e0030000000f65000000000000bf5400000000000007040000040000003d3201000000000095000000000000004d54000000000000b700000000000000950000000000000014"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0xbe71) flock(r1, 0xc) exit(0x7f) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000100)=0x8) 19:38:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x35, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x200000000000000]}}}]}, 0x70}}, 0x0) 19:38:20 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x9]}}}]}, 0x30}}, 0x0) 19:38:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x16, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:20 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, 0x0, 0xfffffffffffffffd) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0xc01, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x1, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x10000000]}}}]}, 0x70}}, 0x0) [ 829.621210] IPVS: ftp: loaded support on port[0] = 21 19:38:20 executing program 5: seccomp(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:20 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="0df04566781ef1a97472a5467465642e"], &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0xbe71) flock(r1, 0xc) exit(0x7f) flistxattr(r0, &(0x7f0000000380)=""/91, 0x5b) 19:38:20 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x10]}}}]}, 0x30}}, 0x0) 19:38:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x80ffffff]}}}]}, 0x70}}, 0x0) 19:38:20 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0xf000]}}}]}, 0x30}}, 0x0) 19:38:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x400300]}}}]}, 0x70}}, 0x0) 19:38:20 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="747075737b04642e2c6d64350cd16d00"], &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0xbe71) flock(r1, 0xc) exit(0x7f) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000100)=0x2, 0x4) 19:38:20 executing program 5: seccomp(0x1, 0x10000000000000, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x500]}}}]}, 0x30}}, 0x0) [ 830.226512] kauditd_printk_skb: 9 callbacks suppressed [ 830.226529] audit: type=1326 audit(1545075501.045:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=363 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 830.304600] audit: type=1326 audit(1545075501.075:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=326 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0x0 19:38:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0xb]}}}]}, 0x30}}, 0x0) 19:38:21 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x400000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f00000005c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, r2, 0x106, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa99}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc0}, 0x80) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r4, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r3, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r5, 0xae44, 0xbe71) flock(r3, 0xc) exit(0x7f) 19:38:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0xac, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x8000000]}}}]}, 0x70}}, 0x0) 19:38:21 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, 0x0, 0xfffffffffffffffd) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0xc01, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x3]}}}]}, 0x30}}, 0x0) 19:38:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x24, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x3f00]}}}]}, 0x70}}, 0x0) [ 830.565251] IPVS: ftp: loaded support on port[0] = 21 19:38:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x5]}}}]}, 0x30}}, 0x0) 19:38:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x4d, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 831.000997] audit: type=1326 audit(1545075501.825:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=363 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:21 executing program 5: seccomp(0x1, 0xffffffff00000000, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0xffffff80]}}}]}, 0x70}}, 0x0) 19:38:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x5000000]}}}]}, 0x30}}, 0x0) [ 831.224928] audit: type=1326 audit(1545075502.045:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=412 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:22 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000000000712600000000000035060000ff000000bf25000000000000070500000e0000000f65000000000000bf5400000000000007040000040000003d4301000000000095000000000000006154000000000000bf250000000000000f65000000000000070500000e000000bf5400000000000007040000040000003d43010000000000950000000000000061540000000000006b25000000000000070500000e0000000f6500000000000007050000040000000f65000000000000bf5400000000000007040000040000003d3201000000000095000000000000004d54000000000000b700000000000000950000000000000014"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='tr_sted.,md5sum\x00'], &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) flock(r3, 0x5) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x41ff) flock(r1, 0xc) exit(0x7f) 19:38:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x7, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0xffffff80]}}}]}, 0x30}}, 0x0) 19:38:22 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, 0x0, 0xfffffffffffffffd) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x34000]}}}]}, 0x70}}, 0x0) 19:38:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x2c, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 831.395318] IPVS: ftp: loaded support on port[0] = 21 19:38:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x1000000000000000]}}}]}, 0x30}}, 0x0) 19:38:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x10]}}}]}, 0x70}}, 0x0) 19:38:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x2d, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 832.019853] audit: type=1326 audit(1545075502.835:611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=412 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:22 executing program 5: seccomp(0x1, 0xa00, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x6000000]}}}]}, 0x30}}, 0x0) 19:38:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x100000000000000]}}}]}, 0x70}}, 0x0) 19:38:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x15, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:23 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, 0x0, 0xfffffffffffffffd) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x12]}}}]}, 0x30}}, 0x0) 19:38:23 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000580)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000000000712600000000000035060000ff000000bf25000000000000070500000e0000000f65000000000000bf5400000000000007040000040000003d4301000000000095000000000000006154000000000000bf250000000000000f65000000000000070500000e000000bf5400000000000007040000040000003d43010000000000950000000000000061540000000000006b25000000000000070500000e0000000f6500000000000007050000040000000f65000000000000bf5400000000000007040000040000003d3201000000000095000000000000004d54000000000000b700000000000000950000000000000014156294392c563332f863e91f3ed0e65a1d91bd7eb6d22a144d0a7be0a209009f31964f1c7439a98b5095e71beddc7e5b6fa9ecc3879bd9311f3d755b819829b03c5fc1946c70f999c93dc6504ce7a2"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="74727573746564152c6d643573756d00"], &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0x272d138f, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0xbe71) flock(r1, 0xc) exit(0x7f) 19:38:23 executing program 5: seccomp(0x1, 0x4000000000000000, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 832.277877] IPVS: ftp: loaded support on port[0] = 21 19:38:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x1000000000000000]}}}]}, 0x70}}, 0x0) 19:38:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x3d, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x300000000000000]}}}]}, 0x30}}, 0x0) [ 832.356253] audit: type=1326 audit(1545075503.175:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=472 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x1100]}}}]}, 0x30}}, 0x0) 19:38:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x54, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0xffffff7f00000000]}}}]}, 0x70}}, 0x0) 19:38:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x6]}}}]}, 0x30}}, 0x0) 19:38:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x64, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:23 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, 0x0, 0xfffffffffffffffd) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0xfcffffff00000000]}}}]}, 0x30}}, 0x0) 19:38:23 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000380)={0xe1c6, 0x2, 0x7fffffff, 0x2c5}, 0x10) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r3, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r4, 0xae44, 0xbe71) flock(r1, 0xc) exit(0x7f) [ 833.136206] IPVS: ftp: loaded support on port[0] = 21 [ 833.154086] audit: type=1326 audit(1545075503.975:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=472 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x18c456, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x400000000000000]}}}]}, 0x70}}, 0x0) 19:38:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0xc, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x1200000000000000]}}}]}, 0x30}}, 0x0) 19:38:24 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0xbe71) write$UHID_CREATE2(r3, &(0x7f0000000540)={0xb, 'syz0\x00', 'syz1\x00', 'syz0\x00', 0xb7, 0x5, 0xfff, 0x6, 0x7, 0x9, "b832d9346be6eb90a23fdff72e829c1404f8227bb2f283087e080799cbd5dc1d8eb4e980ed491dc009a54dc9a6cc3db5b65b4303e0aa41851f07ae03ea5d9352d335109dc3e65f1a92f16f3ec4ba486ae606b7932957d9d424a0fecd46b81138cbfe1ec4130ea4fb4109f8f3448ff8f2390b581b9295cc3b82f039aa54daee4832821e20759c8e61bcb447cd6394ed83a317e89267d410732f81e5bdd0d60dee2c081bce18f3ab231ca9049ef264e15fc4e87486b94853"}, 0x1cf) flock(r1, 0xc) exit(0x7f) 19:38:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0xa00]}}}]}, 0x30}}, 0x0) 19:38:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x3c, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x1300]}}}]}, 0x30}}, 0x0) 19:38:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x34000]}}}]}, 0x70}}, 0x0) 19:38:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0xfffffff0]}}}]}, 0x30}}, 0x0) 19:38:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x7fffffea, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x25, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:24 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, 0x0, 0xfffffffffffffffd) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x2]}}}]}, 0x70}}, 0x0) 19:38:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x69c, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0xa]}}}]}, 0x30}}, 0x0) [ 833.859115] IPVS: ftp: loaded support on port[0] = 21 19:38:24 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000800)={0x111199dae5758dc3, 0x0, &(0x7f0000ffb000/0x4000)=nil}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)=0x0) prlimit64(r1, 0xc, &(0x7f0000000500)={0x9, 0xff}, &(0x7f0000000540)) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) flock(r3, 0x4) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f0000000400)=""/95) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000700)={'filter\x00', 0x4c, "be5cea050e61218ab3af59b730a6ed740c7f1aa128c3421ea09ba958706d86c847c74b9aa00de5fef84091a0897badd2c15bdaf4873a5a3c5d5959aabb72ec2b94b55dbffe3cb4c36d74424d"}, &(0x7f0000000780)=0x70) openat$cgroup_ro(r5, &(0x7f0000000480)='rdma.current\x00', 0x0, 0x0) write$selinux_attr(r5, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r4, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r6, 0xae44, 0xbe71) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x4}, &(0x7f0000000380)=0x289) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f00000003c0)={r7, 0x4}, 0x8) flock(r4, 0xc) exit(0x7f) 19:38:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x94, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x10]}}}]}, 0x70}}, 0x0) 19:38:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0xffffff9e]}}}]}, 0x30}}, 0x0) 19:38:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x7ffffff3, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:25 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0xf000000]}}}]}, 0x30}}, 0x0) 19:38:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x7f01, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x1d, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:25 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:25 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x4000000]}}}]}, 0x30}}, 0x0) 19:38:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x200000000000000]}}}]}, 0x70}}, 0x0) 19:38:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x6a0, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 834.631867] IPVS: ftp: loaded support on port[0] = 21 19:38:25 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000640)={0x0, 0x0, 0x3, 0x0, [], [{0x7f, 0x2, 0x5, 0x9032, 0x0, 0x1}, {0x0, 0x7fff, 0x80, 0x1c5, 0x3376cb6e, 0xffffffff00000001}], [[], [], []]}) r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0xff, 0x204040) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000540)={0x7, 0xfe, 0x5, {0xb, @sdr={0x20493859, 0x7}}}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r4, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r3, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r5, 0xae44, 0xbe71) flock(r3, 0xc) exit(0x7f) 19:38:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x74, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x17f, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:25 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x900]}}}]}, 0x30}}, 0x0) 19:38:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x80ffffff00000000]}}}]}, 0x70}}, 0x0) 19:38:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0xffffff1f, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:25 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x4c, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:25 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x11]}}}]}, 0x30}}, 0x0) 19:38:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x40030000000000]}}}]}, 0x70}}, 0x0) [ 835.267961] IPVS: ftp: loaded support on port[0] = 21 19:38:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x7c, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x2, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x4, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x1000000000000]}}}]}, 0x30}}, 0x0) 19:38:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x6, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x1000000]}}}]}, 0x70}}, 0x0) 19:38:27 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:27 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x8, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r3, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r2, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/checkreqprot\x00', 0x40240, 0x0) r5 = semget$private(0x0, 0x2, 0x1f4) semctl$GETNCNT(r5, 0x7, 0xe, &(0x7f0000000100)=""/7) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r4, 0xae44, 0xbe71) socket$pptp(0x18, 0x1, 0x2) flock(r0, 0xf) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000080)={0x2, 0xaa7b, 0x1, 0x60924594, 0x3f, 0x5}) exit(0x7f) 19:38:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x3000000]}}}]}, 0x30}}, 0x0) [ 836.930156] IPVS: ftp: loaded support on port[0] = 21 19:38:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x13, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x28, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x3f000000]}}}]}, 0x70}}, 0x0) 19:38:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0xf00000000000000]}}}]}, 0x30}}, 0x0) 19:38:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x180, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x3, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 837.243254] IPVS: ftp: loaded support on port[0] = 21 19:38:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0xffffff80]}}}]}, 0x70}}, 0x0) 19:38:28 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x100000000000000]}}}]}, 0x30}}, 0x0) 19:38:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x8004, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:28 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) [ 837.979050] IPVS: ftp: loaded support on port[0] = 21 [ 838.641187] bridge0: port 1(bridge_slave_0) entered blocking state [ 838.647680] bridge0: port 1(bridge_slave_0) entered disabled state [ 838.654949] device bridge_slave_0 entered promiscuous mode [ 838.685515] bridge0: port 2(bridge_slave_1) entered blocking state [ 838.691975] bridge0: port 2(bridge_slave_1) entered disabled state [ 838.698910] device bridge_slave_1 entered promiscuous mode [ 838.730118] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 838.759169] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 838.843984] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 838.877478] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 839.060445] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 839.067783] team0: Port device team_slave_0 added [ 839.113576] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 839.121842] team0: Port device team_slave_1 added [ 839.165186] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 839.212150] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 839.245948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 839.289859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 839.431963] device bridge_slave_1 left promiscuous mode [ 839.437507] bridge0: port 2(bridge_slave_1) entered disabled state [ 839.470957] device bridge_slave_0 left promiscuous mode [ 839.476417] bridge0: port 1(bridge_slave_0) entered disabled state [ 839.576727] team0 (unregistering): Port device team_slave_1 removed [ 839.587468] team0 (unregistering): Port device team_slave_0 removed [ 839.598061] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 839.673846] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 839.731445] bond0 (unregistering): Released all slaves [ 839.956602] bridge0: port 2(bridge_slave_1) entered blocking state [ 839.963016] bridge0: port 2(bridge_slave_1) entered forwarding state [ 839.969596] bridge0: port 1(bridge_slave_0) entered blocking state [ 839.976000] bridge0: port 1(bridge_slave_0) entered forwarding state [ 839.983681] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 840.821040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 841.538879] 8021q: adding VLAN 0 to HW filter on device bond0 [ 841.722761] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 841.843834] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 841.850651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 841.857665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 842.036505] 8021q: adding VLAN 0 to HW filter on device team0 19:38:34 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) ioctl$VIDIOC_G_AUDIO(r2, 0x80345621, &(0x7f0000000100)) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0xbe71) exit(0x5) flock(r1, 0xc) exit(0x7f) 19:38:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x50, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:34 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x600000000000000]}}}]}, 0x30}}, 0x0) 19:38:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x5, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x8]}}}]}, 0x70}}, 0x0) 19:38:34 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x5c, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 843.924216] IPVS: ftp: loaded support on port[0] = 21 19:38:34 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x9effffff]}}}]}, 0x30}}, 0x0) 19:38:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x100000000000000]}}}]}, 0x70}}, 0x0) 19:38:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x3, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x2, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:34 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x4]}}}]}, 0x30}}, 0x0) 19:38:35 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/status\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) getsockname$llc(r0, &(0x7f0000000780)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000007c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e21, 0x1000, @loopback, 0x1}}, 0x6, 0x0, 0xffff, 0x4, 0x3f}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000640)={r3, 0xc1, "e23f9adad66d99dabf276ed3605c774773bcfe6d5b8bbbe0600239a8f61255f826026414c7e50f2fdaf2be659af7acca8ab3543e6f1882bd95d3fd34806434eea9a69fb74360f22100cf0ac1e0c6169a4069c554734c58b12fb79260f417a03af4cf080281e447cd0bbc47af0a98ab20e1aa9053a1dfd1190e3724cf1652a53872439d13b0821f912356381112a2e3f30702c85950383f7956da08c75f7a85bf7b8affe1ae8bd932d7eeea9bfa25d2708e71c638c8323ac0fab536647dfdf95d6c"}, &(0x7f0000000740)=0xc9) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='setgroups\x00') ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r4, 0xc040564a, &(0x7f0000000380)={0x5, 0x0, 0x2025, 0x3, 0x8, 0x5, 0x347515aa, 0x1}) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r5, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r2, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r6, 0xae44, 0xbe71) flock(r2, 0xc) exit(0x7f) 19:38:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x480, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x3f00000000000000]}}}]}, 0x70}}, 0x0) 19:38:35 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0xa00000000000000]}}}]}, 0x30}}, 0x0) 19:38:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x14, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:35 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6c, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:35 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x200000000000000]}}}]}, 0x30}}, 0x0) [ 844.915159] IPVS: ftp: loaded support on port[0] = 21 19:38:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x800000000000000]}}}]}, 0x70}}, 0x0) 19:38:35 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xfffffffc]}}}]}, 0x30}}, 0x0) 19:38:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x44, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 845.096373] audit: type=1326 audit(1545075515.915:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1048 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:36 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x0, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) flock(r1, 0xc) exit(0x7f) 19:38:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x9effffff00000000]}}}]}, 0x30}}, 0x0) 19:38:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x400000000000000]}}}]}, 0x70}}, 0x0) 19:38:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x1c, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:36 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x1300000000000000]}}}]}, 0x30}}, 0x0) [ 845.847742] audit: type=1326 audit(1545075516.665:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1048 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 845.878762] IPVS: ftp: loaded support on port[0] = 21 19:38:36 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000380)={0x0, "5b7d484d01876376ebfcaa65266a9984c21f4000e2fc03e525c77ac16cbef039", 0x2, 0x1}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r3, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r2, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r4, 0xae44, 0xbe71) flock(r2, 0xc) exit(0x7f) 19:38:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x34, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x400300]}}}]}, 0x70}}, 0x0) 19:38:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x10000000]}}}]}, 0x30}}, 0x0) [ 846.018891] QAT: Invalid ioctl [ 846.056599] audit: type=1326 audit(1545075516.875:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1091 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 846.098532] QAT: Invalid ioctl 19:38:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x30, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xf0ffffffffffff]}}}]}, 0x30}}, 0x0) 19:38:37 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f00000005c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000000000712600000000000035060000ff000000bf25000000000000070500000e0000000f65000000000000bf5400000000000007040000040000003d4301000000000095000000000000006154000000000000bf250000000000000f65000000000000070500000e000000bf5400000000000007040000040000003d4301000000000000000061540000000000006b25000000000000070500000e0000000f6500000000000007050000040000000f65000000000000bf5400000000000007040000040000003d3201000000000095000000000000004d54000000000000b7000000000000009500000000000000144507d80581f846877844983cdb3e81be26eced5938a4df0698f6ac337892b469a84c89b523f106928561701b22e192961d12c82e379ebf2bcaee079951620e13da05095db990c4735bc25c7cb43daaf78e68618afaa1ce543891466e4980fca3a8f8ce030ab2f3572129f0f22faa7d4216072dc363363bf8494ce206ce579a807c7fc7293b98db33e47fe0cedf12426da0353aeb0000000000"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r3, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="74727500006564d7071a83fc2e2c6e64"], &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r4, 0xae44, 0xbe71) flock(r2, 0xc) exit(0x7f) 19:38:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x2000000]}}}]}, 0x70}}, 0x0) 19:38:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x9c, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0xffffff7f]}}}]}, 0x70}}, 0x0) 19:38:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xb000000]}}}]}, 0x30}}, 0x0) 19:38:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0xa4, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:37 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) [ 846.765710] IPVS: ftp: loaded support on port[0] = 21 [ 846.840515] audit: type=1326 audit(1545075517.665:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1091 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x2]}}}]}, 0x30}}, 0x0) 19:38:37 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ion\x00', 0x4001, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr$security_selinux(r2, &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000380)='system_u:object_r:fsadm_exec_t:s0\x00', 0x22, 0x2) fsetxattr(r1, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0xbe71) flock(r1, 0xc) exit(0x7f) 19:38:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x21, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x3f00]}}}]}, 0x70}}, 0x0) 19:38:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x300000000000000]}}}]}, 0x30}}, 0x0) [ 847.030677] audit: type=1400 audit(1545075517.845:618): avc: denied { associate } for pid=1158 comm="syz-executor0" name="vga_arbiter" dev="devtmpfs" ino=1034 scontext=system_u:object_r:fsadm_exec_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 19:38:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x48, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x4]}}}]}, 0x70}}, 0x0) [ 847.127054] audit: type=1326 audit(1545075517.885:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1163 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xb]}}}]}, 0x30}}, 0x0) 19:38:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x5, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x80ffffff]}}}]}, 0x70}}, 0x0) 19:38:38 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xa00000000000000]}}}]}, 0x30}}, 0x0) [ 847.650545] IPVS: ftp: loaded support on port[0] = 21 19:38:38 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000000000712600000000000035060000ff000000bf25000000000000070500000e0000000f65000000000000bf5400000000000007040000040000003d4301000000000095000000000000006154000000000000bf250000000000000f65000000000000070500000e000000bf5400000000000007040000040000003d43010000000000950000000000000061540000000000006b25000000000000070500000e0000000f6500000000000007050000040000000f65000000000000bf5400000000000007040000040000003d3201000000000095000000000000004d54000000000000b700000000000000950000000000000014"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x30d) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0xbe71) flock(r1, 0xc) exit(0x7f) [ 847.862151] audit: type=1326 audit(1545075518.685:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1163 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0xb1, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x1000000000000000]}}}]}, 0x70}}, 0x0) 19:38:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xf00000000000000]}}}]}, 0x30}}, 0x0) 19:38:38 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x0, 0x400) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000540)={'erspan0\x00', {0x2, 0x4e20, @remote}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r3 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x1, 0x42100) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0385720, &(0x7f0000000380)={0x0, {}, 0x8000, 0x5ef0}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r4, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r2, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r5, 0xae44, 0xbe71) flock(r2, 0xc) exit(0x7f) 19:38:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x5000000]}}}]}, 0x30}}, 0x0) [ 848.009701] audit: type=1326 audit(1545075518.825:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1212 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x61, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0xffffff7f00000000]}}}]}, 0x70}}, 0x0) 19:38:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x9]}}}]}, 0x30}}, 0x0) 19:38:39 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x87, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x1000000000000]}}}]}, 0x30}}, 0x0) [ 848.275845] IPVS: ftp: loaded support on port[0] = 21 [ 848.809604] audit: type=1326 audit(1545075519.625:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1212 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x45, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x10000000]}}}]}, 0x70}}, 0x0) 19:38:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x500000000000000]}}}]}, 0x30}}, 0x0) [ 848.890986] audit: type=1326 audit(1545075519.715:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1246 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:39 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = request_key(&(0x7f0000000080)='keyring\x00', &(0x7f0000000540)={'syz', 0x0}, &(0x7f0000000580)='cgroup\'\x00', 0xfffffffffffffffc) r3 = request_key(&(0x7f00000005c0)='blacklist\x00', &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)='/selinux/checkreqprot\x00', 0xfffffffffffffffb) keyctl$unlink(0x9, r2, r3) r4 = dup2(r1, r1) ioctl$KVM_GET_REG_LIST(r4, 0xc008aeb0, &(0x7f0000000680)={0x3, [0x1, 0x1, 0x6]}) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r5, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="747275737465642e2c6d644bdb67e5ef79fa0bc33573756d00"], &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x200000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r6, 0xae44, 0xbe71) connect$unix(r6, &(0x7f0000000380)=@abs={0x1, 0x0, 0x9}, 0x6e) flock(r1, 0xc) exit(0x7f) 19:38:39 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xf000]}}}]}, 0x30}}, 0x0) 19:38:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x1000000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xb00000000000000]}}}]}, 0x30}}, 0x0) 19:38:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x4000000]}}}]}, 0x70}}, 0x0) [ 849.027472] IPVS: ftp: loaded support on port[0] = 21 19:38:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x600000000000000]}}}]}, 0x30}}, 0x0) 19:38:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x8000000]}}}]}, 0x70}}, 0x0) 19:38:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xfcffffff]}}}]}, 0x30}}, 0x0) 19:38:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xffffff7f]}}}]}, 0x70}}, 0x0) 19:38:40 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) [ 849.809487] IPVS: ftp: loaded support on port[0] = 21 19:38:40 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x40000000000000, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x2, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x800, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000680)='/dev/snd/pcmC#D#c\x00', 0x23, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r4, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r3, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r5, 0xae44, 0xbe71) flock(r3, 0xc) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000600)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x88, r6, 0x800, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) ioctl$NBD_DO_IT(r2, 0xab03) exit(0x4) 19:38:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x1200]}}}]}, 0x30}}, 0x0) 19:38:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x100000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x4]}}}]}, 0x70}}, 0x0) 19:38:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x600]}}}]}, 0x30}}, 0x0) 19:38:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x34000]}}}]}, 0x70}}, 0x0) 19:38:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x1300]}}}]}, 0x30}}, 0x0) 19:38:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x110]}}}]}, 0x30}}, 0x0) 19:38:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x40030000000000]}}}]}, 0x70}}, 0x0) 19:38:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x1100000000000000]}}}]}, 0x30}}, 0x0) 19:38:41 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) [ 850.686233] kauditd_printk_skb: 5 callbacks suppressed [ 850.686250] audit: type=1326 audit(1545075521.505:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1306 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 850.776221] audit: type=1326 audit(1545075521.595:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1313 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 850.850073] audit: type=1326 audit(1545075521.655:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1344 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 850.871136] IPVS: ftp: loaded support on port[0] = 21 19:38:41 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f0000000540)=""/86) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f00000005c0)=0xf, 0x4) setsockopt$inet_mreq(r2, 0x0, 0x27, &(0x7f0000000380)={@multicast1, @loopback}, 0x8) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0xbe71) prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='!].cpusetvboxnet1vboxnet0GPL\x00') setsockopt$inet_mreqsrc(r2, 0x0, 0x28, &(0x7f00000003c0)={@empty, @remote, @rand_addr=0x3}, 0xc) flock(r1, 0xc) exit(0x7f) 19:38:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x4000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x1000000000000000]}}}]}, 0x30}}, 0x0) 19:38:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x10000000]}}}]}, 0x70}}, 0x0) [ 850.942899] audit: type=1326 audit(1545075521.765:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1359 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x3000000]}}}]}, 0x30}}, 0x0) 19:38:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x3f000000]}}}]}, 0x70}}, 0x0) 19:38:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x11000000]}}}]}, 0x30}}, 0x0) 19:38:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x9effffff]}}}]}, 0x30}}, 0x0) [ 851.638863] audit: type=1326 audit(1545075522.455:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1344 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x2000000]}}}]}, 0x70}}, 0x0) 19:38:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x1100]}}}]}, 0x30}}, 0x0) 19:38:42 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) [ 851.742833] audit: type=1326 audit(1545075522.565:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1359 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 851.830330] audit: type=1326 audit(1545075522.645:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1397 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:42 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000000000712600000000000035060000ff000000bf25000000000000070500000e0000000f65000000000000bf5400000000000007040000040000003d4301002000000095000000000000006154000000000000bf25005c5209a6000f65000000000000070500000e000008bf5400000000000007040000040000003d43010000000000950000000000000061540000000000006b25000000000000070500000e0000000f6500000000000007050000040000000f65000000000000bf5400000000000007040000040000003d3201000000000095000000000000004d54000000000000b700000000000000950000000000000014"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0xbe71) flock(r1, 0xc) exit(0x7f) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x10400, 0x0) 19:38:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x900]}}}]}, 0x30}}, 0x0) 19:38:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x3f00000000000000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x8000000]}}}]}, 0x70}}, 0x0) 19:38:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x4]}}}]}, 0x30}}, 0x0) [ 851.957776] audit: type=1326 audit(1545075522.775:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1405 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x2]}}}]}, 0x70}}, 0x0) 19:38:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xfcffffff00000000]}}}]}, 0x30}}, 0x0) 19:38:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x3f00000000000000]}}}]}, 0x30}}, 0x0) 19:38:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xf0ffffff]}}}]}, 0x30}}, 0x0) 19:38:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x800000000000000]}}}]}, 0x70}}, 0x0) 19:38:43 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) [ 852.624006] audit: type=1326 audit(1545075523.445:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1397 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 852.740142] audit: type=1326 audit(1545075523.555:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1442 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000000000712600000000000035060000ff000000bf25000000000000070500000e0000000f65000000000000bf5400000000000007040000040000003d4301000000000095000000000000006154000000000000bf250000000000000f65000000000000070500000e000000bf5400000000000007040000040000003d43010000000000950000000000000061540000000000006b25000000000000070500000e0000000f6500000000000007050000040000000f65000000000000bf5400000000000007040000040000003d3201000000000095000000000000004d54000000000000b700000000000000950000000000000014"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r3 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0xfff, 0x100) getpeername$llc(r3, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000003c0)=0x10) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r4, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r2, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r5, 0xae44, 0xbe71) flock(r2, 0xc) exit(0x7f) 19:38:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xa000000]}}}]}, 0x30}}, 0x0) 19:38:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x400000000000000]}}}]}, 0x70}}, 0x0) 19:38:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x200000000000000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xa]}}}]}, 0x30}}, 0x0) 19:38:43 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x9, 0x412000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x40, 0x444000) openat$vim2m(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video35\x00', 0x2, 0x0) pipe(&(0x7f0000000540)) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000580)='/dev/video36\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x200, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r3, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) fsetxattr(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB='trusted..md5sum\x00'], &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r4, 0xae44, 0xbe71) flock(r2, 0xc) exit(0x7f) 19:38:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x1000000000000000]}}}]}, 0x70}}, 0x0) 19:38:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x6]}}}]}, 0x30}}, 0x0) 19:38:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x4000000]}}}]}, 0x70}}, 0x0) 19:38:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x1200000000000000]}}}]}, 0x30}}, 0x0) 19:38:44 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xfffffff0]}}}]}, 0x30}}, 0x0) 19:38:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x80ffffff]}}}]}, 0x70}}, 0x0) 19:38:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xf0ffffff00000000]}}}]}, 0x30}}, 0x0) 19:38:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x4000000000000000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xffffff7f00000000]}}}]}, 0x30}}, 0x0) 19:38:44 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='trus\t\x00\x00\x00,md5sum\x00'], &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0xbe71) flock(r1, 0xc) exit(0x0) 19:38:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x3f00000000000000]}}}]}, 0x70}}, 0x0) 19:38:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x100000000000000]}}}]}, 0x30}}, 0x0) 19:38:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x3f00]}}}]}, 0x30}}, 0x0) 19:38:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x1000000]}}}]}, 0x70}}, 0x0) 19:38:45 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xf000000]}}}]}, 0x30}}, 0x0) [ 854.603896] IPVS: ftp: loaded support on port[0] = 21 19:38:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xffffff80]}}}]}, 0x70}}, 0x0) 19:38:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x6000000]}}}]}, 0x30}}, 0x0) 19:38:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0xffffffffa0010000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x10]}}}]}, 0x70}}, 0x0) 19:38:45 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7472758f74bb241db4a49975dcc4447b8c0a0dad29870a9f471751a6e5d5c93c10a16e06632bf87ed1"], &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f00000000c0)=0x6) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0xbe71) flock(r1, 0xc) exit(0x7f) 19:38:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xf00]}}}]}, 0x30}}, 0x0) 19:38:45 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x10, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) [ 855.018350] IPVS: ftp: loaded support on port[0] = 21 19:38:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:46 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x20000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000000000712600000000000035060000ff000000bf25000000000000070500000e0000000f65000000000000bf5400000000000007040000040000003d430100000000751d000000000000006154000000000000bf250000000000000f6500000000000007053e2932b10000bf5400000000000007040000040000003d43010000000000950000000000000061540000000000006b25000000000000070500000e0000000f6500000000000007050000040000000f65000000000000bf540000000052dcbf650000040000003d3201000000000095000000000000004d54000000000000b700000000000000950000000000000014"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) getsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f0000000100), &(0x7f0000000380)=0x4) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0xbe71) flock(r1, 0xc) exit(0x7f) 19:38:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xffffff7f00000000]}}}]}, 0x70}}, 0x0) 19:38:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x8]}}}]}, 0x30}}, 0x0) 19:38:46 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x10, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xffffff9e]}}}]}, 0x30}}, 0x0) [ 855.626554] IPVS: ftp: loaded support on port[0] = 21 19:38:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x800000000000000]}}}]}, 0x30}}, 0x0) [ 855.712699] kauditd_printk_skb: 12 callbacks suppressed [ 855.712714] audit: type=1326 audit(1545075526.535:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1564 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x5000000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x80ffffff00000000]}}}]}, 0x70}}, 0x0) 19:38:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x200000000000000]}}}]}, 0x30}}, 0x0) 19:38:46 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x10, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) [ 855.959109] audit: type=1326 audit(1545075526.775:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1618 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xfffff000]}}}]}, 0x30}}, 0x0) [ 856.152104] IPVS: ftp: loaded support on port[0] = 21 19:38:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x300]}}}]}, 0x30}}, 0x0) 19:38:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x200000000000000]}}}]}, 0x70}}, 0x0) 19:38:47 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:47 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000003c0)={0x2, &(0x7f0000000380)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000540)={r2, 0x1}) socket$netlink(0x10, 0x3, 0x7) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f00000006c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf20009985fe7e7c9983a100a60000080000003d0301000000000095000000000035060000ff000000bf25000000000000070500000e0000000f650000040000003d4301000000000095000000000001006154000000000000bf250000000000000f65000000000000070500000e000000bf5400000000000007040000040000003d43010000000000950000000000000061540000000000006b25000000008de5126c1ad2169a15250bea0000070500003b3621e80e0000000f6500000000000007050000040000000f65000000000000bf5400000000000007040000040000003d3201000000000095000000000000004d54000000000000b7000000000000009500000000000000000000"], 0x0}, 0x48) r4 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) r5 = getpid() perf_event_open(&(0x7f00000005c0)={0x4, 0x70, 0x3f, 0xe92, 0x100000001, 0x40, 0x0, 0x7fff, 0x800, 0x3, 0x974b, 0x280, 0x950, 0x180000000, 0x7, 0xc3a, 0x4, 0x6, 0x10001, 0x0, 0x6, 0x2, 0x2, 0x9, 0x100000001, 0x3, 0x100000000000000, 0x8000, 0x7, 0x1, 0x401, 0x4, 0x6, 0x401, 0xbb68, 0x9, 0x9, 0x7, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000580), 0x1}, 0x20000, 0x5, 0x8, 0xb, 0x7fff, 0x5, 0x8}, r5, 0xf, r1, 0x2) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r4, &(0x7f0000000340)='system_u:object_r:devicekit_exec_t:s0\x00', 0xc) init_module(&(0x7f0000000400)='#-^md5sumGPL[:cpuset&\x00', 0x16, &(0x7f0000000440)='trusted.') fsetxattr(r3, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) setsockopt$inet_opts(r6, 0x0, 0x9, &(0x7f0000000640)="051c7ce1679529a350016b", 0xb) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r7, 0xae44, 0xbe71) flock(r3, 0xc) write$P9_RWALK(r7, &(0x7f0000000680)={0x23, 0x6f, 0x2, {0x2, [{0x3, 0x1, 0x7}, {0x41, 0x1, 0x5}]}}, 0x23) exit(0x7f) [ 856.399327] audit: type=1326 audit(1545075527.215:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1596 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x900000000000000]}}}]}, 0x30}}, 0x0) [ 856.536236] IPVS: ftp: loaded support on port[0] = 21 [ 856.543530] audit: type=1326 audit(1545075527.365:654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1644 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x100000000000000]}}}]}, 0x70}}, 0x0) [ 856.750137] audit: type=1326 audit(1545075527.565:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1618 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x200000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x80ffffff]}}}]}, 0x30}}, 0x0) 19:38:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x400300]}}}]}, 0x70}}, 0x0) 19:38:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xb00]}}}]}, 0x30}}, 0x0) [ 856.881262] audit: type=1326 audit(1545075527.705:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1664 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x3f00]}}}]}, 0x70}}, 0x0) 19:38:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x5]}}}]}, 0x30}}, 0x0) 19:38:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xfffffffffffff000]}}}]}, 0x30}}, 0x0) 19:38:48 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, 0x0, &(0x7f0000000440)) [ 857.342188] audit: type=1326 audit(1545075528.165:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1644 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x8]}}}]}, 0x70}}, 0x0) 19:38:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xffffff7f]}}}]}, 0x30}}, 0x0) 19:38:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:48 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x3) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0xbe71) flock(r1, 0xc) exit(0x7f) [ 857.406500] IPVS: ftp: loaded support on port[0] = 21 [ 857.519984] audit: type=1326 audit(1545075528.335:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1705 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 857.680573] audit: type=1326 audit(1545075528.505:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1664 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x8000000]}}}]}, 0x30}}, 0x0) 19:38:48 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0xbe71) flock(r1, 0xc) exit(0x7f) 19:38:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x1a0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x10]}}}]}, 0x70}}, 0x0) 19:38:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x3f000000]}}}]}, 0x30}}, 0x0) [ 857.806872] audit: type=1326 audit(1545075528.625:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1719 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xa00]}}}]}, 0x30}}, 0x0) 19:38:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}}]}, 0x70}}, 0x0) 19:38:48 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, 0x0) 19:38:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x500]}}}]}, 0x30}}, 0x0) 19:38:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xf0]}}}]}, 0x30}}, 0x0) [ 858.075940] IPVS: ftp: loaded support on port[0] = 21 19:38:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}}]}, 0x70}}, 0x0) 19:38:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x3]}}}]}, 0x30}}, 0x0) 19:38:49 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0xbe71) flock(r1, 0xc) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0}, &(0x7f00000003c0)=0x14) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000540)={r4, 0x1, 0x6, @dev={[], 0xf}}, 0x10) exit(0x7f) 19:38:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x3f000000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x11]}}}]}, 0x30}}, 0x0) 19:38:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x4000000]}}}]}, 0x70}}, 0x0) 19:38:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xffffff80]}}}]}, 0x30}}, 0x0) 19:38:49 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/vsock\x00', 0x90400, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000a80)={'veth0_to_team\x00', {0x2, 0x4e22, @rand_addr=0x8}}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) fsetxattr(r2, &(0x7f0000000ac0)=@known='user.syz\x00', &(0x7f0000000b00)='\x00', 0x1, 0x1) write$selinux_attr(r3, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f00000000c0)=@random={'trusted.', ',md5sum\x00'}, &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r4, 0xae44, 0xbe71) flock(r1, 0xc) ioctl$DRM_IOCTL_MAP_BUFS(r4, 0xc0186419, &(0x7f0000000100)={0x5, &(0x7f0000000540)=""/208, &(0x7f00000009c0)=[{0x0, 0xb3, 0xfffffffffffffff8, &(0x7f0000000640)=""/179}, {0x0, 0xc4, 0x0, &(0x7f0000000700)=""/196}, {0x10, 0xa2, 0x7f, &(0x7f0000000800)=""/162}, {0x800, 0x5b, 0x1799ceb640000000, &(0x7f0000000380)=""/91}, {0x10001, 0xdf, 0x9, &(0x7f00000008c0)=""/223}]}) exit(0x7f) 19:38:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x12]}}}]}, 0x30}}, 0x0) 19:38:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}]}, 0x70}}, 0x0) 19:38:49 executing program 2 (fault-call:5 fault-nth:0): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) [ 859.019760] IPVS: ftp: loaded support on port[0] = 21 19:38:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x13]}}}]}, 0x30}}, 0x0) 19:38:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xffffff80]}}}]}, 0x70}}, 0x0) [ 859.458701] FAULT_INJECTION: forcing a failure. [ 859.458701] name failslab, interval 1, probability 0, space 0, times 0 [ 859.489722] CPU: 0 PID: 1788 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #155 [ 859.497058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 859.506457] Call Trace: [ 859.509097] dump_stack+0x244/0x39d [ 859.512769] ? dump_stack_print_info.cold.1+0x20/0x20 [ 859.518035] ? perf_trace_lock+0x4a7/0x7a0 [ 859.522318] should_fail.cold.4+0xa/0x17 [ 859.526425] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 859.531558] ? __mutex_lock+0x85e/0x16f0 [ 859.535655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 859.541231] ? check_preemption_disabled+0x48/0x280 [ 859.546326] ? find_held_lock+0x36/0x1c0 [ 859.550458] ? perf_trace_sched_process_exec+0x860/0x860 [ 859.555951] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 859.560925] __should_failslab+0x124/0x180 [ 859.565224] should_failslab+0x9/0x14 [ 859.569052] __kmalloc+0x2e0/0x760 [ 859.572682] ? __might_fault+0x12b/0x1e0 [ 859.576779] ? lock_downgrade+0x900/0x900 [ 859.581029] ? ipt_alloc_initial_table+0x6b/0x670 [ 859.585913] ipt_alloc_initial_table+0x6b/0x670 [ 859.590613] iptable_raw_table_init+0x8b/0xd0 [ 859.595170] xt_find_table_lock+0x296/0x430 [ 859.599534] xt_request_find_table_lock+0x2b/0xe0 [ 859.604456] get_info+0x17a/0x6f0 [ 859.607946] ? compat_table_info+0x4c0/0x4c0 [ 859.612382] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 859.617705] ? lock_is_held_type+0x210/0x210 [ 859.622138] ? check_preemption_disabled+0x48/0x280 [ 859.627197] ? selinux_capable+0x36/0x40 [ 859.631285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 859.636851] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 859.642420] ? ns_capable_common+0x13f/0x170 [ 859.646856] do_ipt_get_ctl+0x176/0xbc0 [ 859.650877] ? alloc_counters.isra.11+0x830/0x830 [ 859.655763] ? __might_fault+0x12b/0x1e0 [ 859.659856] ? lock_downgrade+0x900/0x900 [ 859.664029] ? lock_release+0xa00/0xa00 [ 859.668015] ? perf_trace_sched_process_exec+0x860/0x860 [ 859.673515] ? mutex_unlock+0xd/0x10 [ 859.677244] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 859.682565] nf_getsockopt+0x80/0xe0 [ 859.686339] ip_getsockopt+0x1af/0x240 [ 859.690254] ? do_ip_getsockopt+0x2470/0x2470 [ 859.694809] udp_getsockopt+0x62/0xa0 [ 859.698645] sock_common_getsockopt+0x9a/0xe0 [ 859.703171] __sys_getsockopt+0x1ad/0x390 [ 859.707342] ? kernel_setsockopt+0x1d0/0x1d0 [ 859.711776] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 859.716415] ? trace_hardirqs_on+0xbd/0x310 [ 859.720773] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 859.726169] ? trace_hardirqs_off_caller+0x310/0x310 [ 859.731295] __x64_sys_getsockopt+0xbe/0x150 [ 859.735778] do_syscall_64+0x1b9/0x820 [ 859.739711] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 859.745097] ? syscall_return_slowpath+0x5e0/0x5e0 [ 859.750039] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 859.754905] ? trace_hardirqs_on_caller+0x310/0x310 [ 859.759943] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 859.764979] ? prepare_exit_to_usermode+0x291/0x3b0 [ 859.770027] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 859.774898] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 859.780102] RIP: 0033:0x457669 [ 859.783326] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 859.802262] RSP: 002b:00007fec09d27c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 19:38:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x1001]}}}]}, 0x30}}, 0x0) [ 859.809987] RAX: ffffffffffffffda RBX: 00007fec09d27c90 RCX: 0000000000457669 [ 859.817267] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000005 [ 859.824548] RBP: 000000000072bf00 R08: 0000000020000440 R09: 0000000000000000 [ 859.831827] R10: 0000000020000200 R11: 0000000000000246 R12: 00007fec09d286d4 [ 859.839132] R13: 00000000004be32a R14: 00000000004ce388 R15: 0000000000000006 19:38:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0xff0f, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:50 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x0, 0x0) clone(0x802182801ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d3, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x3, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x6991, 0x80000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xec, 0x7, 0xb7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40140, 0x0) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:var_lock_t:s0\x00', 0x20) fsetxattr(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="f4adfce14d95c874b6fea4b2a36bc69e45115ffea225a92cee46"], &(0x7f0000000300)='vboxnet0{proc^wlan1\x00', 0x14, 0x3) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40240, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)={0x57, 0xd, 0x0, {0x6a4c, 0x100000000}, {0x1ff, 0x6}, @cond=[{0x200, 0x9, 0x8, 0x3, 0x9, 0x6}, {0x101, 0x100000000, 0x3, 0x80, 0x5, 0x1}]}) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0xbe71) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)=@known='system.advise\x00') flock(r1, 0xc) exit(0x7f) 19:38:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x400000000000000]}}}]}, 0x30}}, 0x0) 19:38:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x80ffffff]}}}]}, 0x70}}, 0x0) 19:38:50 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="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") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu\x00\xe5F\x8f\x0f\x94R\xa9o\xf6J\xe2\xc3\xb9D\xfe)\x89\xcf\xc7\xd1\xe56\x8bz\xf7\x9b%\xcf\x9e\x90\xad\xfa1\x1d\xecMg\xaf\xf9\xa3S\x90\x13X\x0e\x01\xa7\xc2\xae\xd2Z\xe7\xfa\xb7\xbf\xda\xf6_8\xab\x9by\b\x1fB_d\xb8\n\x00\x00\\\xff\x88o\xedZ\xf7\xd0\x1c-\xach\xa87k\xb3q\xb5\x8aJ_\xf8\xf0\x11\x9a7\xbd\xef-\xf5\x0e\x95A\tW\xab\xdb\x0e\x82|P\xd6-,\xc7\xf1[\xa4O.\xab\x8a3\xd7\x8b\f\xa4\r~\x81\xbe\xcbG\xfc\xd1\xaa\xbbSfu\xcaH\xab!`\xfd\xfd\r\f\xfc\x1b\x17\x15\xf7\xbd\xcey\xc9\xcdI=\x81\xf2\xa3\x93\xd5\xabp\xd4)\x1a\xcf\xd7k\xd4\x10i\x93dN\xa1b\xc0\x0e\x7fb?\xa2\x1a\x9b~\xb1Z\x9c\xb6\xeb\xfe\x83(\xe4\x06\xc2\xb0b\xc0A\x95P\xf5\xfe\xd4\xf3^\xe0\x15|_py\xe9\xb6\x89\xcd3ju\x89\xd1\xa1\x0f^\xc0\x8c\xc1\x0e\xfd)\x99)\xa7#L\x87\xfe]\xf1\xf7\xe0\x99\x89\xb2\x82m\xa6\x17g\xb5\x92\xd8Y\xd5\x19\x9d\xf8\xbb@\xfa\xcc\xc2\x9b^\x046\xean.\xbcU\xeePi\xbb\xf5\x1fl\x05\x91\x9e\xd4+\xed\x16>\xb5\x84G\xfb\xe7\x11\xec\xd6D\x0f2\xd5\xa0q\xc3\x99\x8d\xfc\x99\xf6V{\xab\x8c[l\xd2|!\xad\x04\xd7\x80\xb0\x00\xe6=\xd8\xe7\x16\xfd\x9e?\xb4\xae\xf7\x80\x97\xdf&\xc1\x80\xf9\x12\xa1\x1bCl\xd8\'M\xac\xa6\x16\xa2\xbf-\x92\x1a\x9c\xd8\xc9\xa4w\x94\x1f^\x11\xcar\xf3\xceh\xaaZ8Z9uv\v\x97,\x0e~}}EiiG}\xb6\xed.\xd4\x8b\n)\xbc\x8e\xf4\xdf\xc2\b\xfe!\xbb\x1ao\xb8h', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='notify_on_release\x00', 0x2, 0x0) close(r2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20100, 0x0) sendfile(r2, r2, 0x0, 0x8) 19:38:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x10010000]}}}]}, 0x30}}, 0x0) 19:38:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x10000000]}}}]}, 0x70}}, 0x0) 19:38:51 executing program 2 (fault-call:5 fault-nth:1): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ustat(0x2d5c1f7b, &(0x7f0000000000)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAP_AMBIENT(0x2f, 0x1, 0x0) [ 860.418614] IPVS: ftp: loaded support on port[0] = 21 19:38:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x4000000]}}}]}, 0x30}}, 0x0) 19:38:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}}]}, 0x70}}, 0x0) [ 860.827391] FAULT_INJECTION: forcing a failure. [ 860.827391] name failslab, interval 1, probability 0, space 0, times 0 [ 860.838797] CPU: 0 PID: 1843 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #155 [ 860.846093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 860.855474] Call Trace: [ 860.858084] dump_stack+0x244/0x39d [ 860.861758] ? dump_stack_print_info.cold.1+0x20/0x20 [ 860.866969] ? perf_trace_lock+0x4a7/0x7a0 [ 860.871241] should_fail.cold.4+0xa/0x17 [ 860.875327] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 860.880482] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 860.885810] ? is_bpf_text_address+0xd3/0x170 [ 860.890343] ? kernel_text_address+0x79/0xf0 [ 860.894781] ? find_held_lock+0x36/0x1c0 [ 860.898910] ? perf_trace_sched_process_exec+0x860/0x860 [ 860.904373] ? ipt_alloc_initial_table+0x6b/0x670 [ 860.909235] ? iptable_raw_table_init+0x8b/0xd0 [ 860.913922] ? xt_find_table_lock+0x296/0x430 [ 860.918436] ? xt_request_find_table_lock+0x2b/0xe0 [ 860.923473] ? nf_getsockopt+0x80/0xe0 [ 860.927376] ? ip_getsockopt+0x1af/0x240 [ 860.931472] __should_failslab+0x124/0x180 [ 860.935730] should_failslab+0x9/0x14 [ 860.939548] kmem_cache_alloc_node_trace+0x270/0x740 [ 860.944699] __kmalloc_node+0x3c/0x70 [ 860.948581] kvmalloc_node+0x65/0xf0 [ 860.952323] xt_alloc_table_info+0x42/0xa0 [ 860.956577] ipt_register_table+0x12f/0x3f0 [ 860.960926] ? translate_table+0x1760/0x1760 [ 860.965357] ? rcu_read_lock_sched_held+0x14f/0x180 [ 860.970390] ? __kmalloc+0x5ee/0x760 [ 860.974132] ? __might_fault+0x12b/0x1e0 [ 860.978228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 860.983780] ? ipt_alloc_initial_table+0x560/0x670 [ 860.988737] iptable_raw_table_init+0xb0/0xd0 [ 860.993258] xt_find_table_lock+0x296/0x430 [ 860.997622] xt_request_find_table_lock+0x2b/0xe0 [ 861.002489] get_info+0x17a/0x6f0 [ 861.005973] ? compat_table_info+0x4c0/0x4c0 [ 861.010400] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 861.015735] ? lock_is_held_type+0x210/0x210 [ 861.020163] ? check_preemption_disabled+0x48/0x280 [ 861.025238] ? selinux_capable+0x36/0x40 [ 861.029330] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 861.034921] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 861.040481] ? ns_capable_common+0x13f/0x170 [ 861.044922] do_ipt_get_ctl+0x176/0xbc0 [ 861.048930] ? alloc_counters.isra.11+0x830/0x830 [ 861.053788] ? __might_fault+0x12b/0x1e0 [ 861.057867] ? lock_downgrade+0x900/0x900 [ 861.062046] ? lock_release+0xa00/0xa00 [ 861.066032] ? perf_trace_sched_process_exec+0x860/0x860 [ 861.071514] ? mutex_unlock+0xd/0x10 [ 861.075260] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 861.080565] nf_getsockopt+0x80/0xe0 [ 861.084321] ip_getsockopt+0x1af/0x240 [ 861.088256] ? do_ip_getsockopt+0x2470/0x2470 [ 861.092808] udp_getsockopt+0x62/0xa0 [ 861.096660] sock_common_getsockopt+0x9a/0xe0 [ 861.101205] __sys_getsockopt+0x1ad/0x390 [ 861.105386] ? kernel_setsockopt+0x1d0/0x1d0 [ 861.109823] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 861.114432] ? trace_hardirqs_on+0xbd/0x310 [ 861.118795] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 861.124179] ? trace_hardirqs_off_caller+0x310/0x310 [ 861.129310] __x64_sys_getsockopt+0xbe/0x150 [ 861.133743] do_syscall_64+0x1b9/0x820 [ 861.137642] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 861.143033] ? syscall_return_slowpath+0x5e0/0x5e0 [ 861.147980] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 861.152845] ? trace_hardirqs_on_caller+0x310/0x310 [ 861.157880] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 861.162920] ? prepare_exit_to_usermode+0x291/0x3b0 [ 861.167967] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 861.172842] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 861.178046] RIP: 0033:0x457669 [ 861.181251] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 861.200176] RSP: 002b:00007fec09d27c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 861.207896] RAX: ffffffffffffffda RBX: 00007fec09d27c90 RCX: 0000000000457669 [ 861.215179] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000005 [ 861.222462] RBP: 000000000072bf00 R08: 0000000020000440 R09: 0000000000000000 [ 861.229742] R10: 0000000020000200 R11: 0000000000000246 R12: 00007fec09d286d4 [ 861.237026] R13: 00000000004be32a R14: 00000000004ce388 R15: 0000000000000006 [ 861.247746] kauditd_printk_skb: 10 callbacks suppressed [ 861.247762] audit: type=1326 audit(1545075532.065:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1819 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x3f00, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:52 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x200000088) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x13, &(0x7f0000000000)={@mcast1}, &(0x7f0000000040)=0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000fbef6d)=""/185, 0xfffffffffffffeba, 0x0, 0x0, 0x1fe) sendto$inet6(r1, &(0x7f0000000800)="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", 0x1000, 0x0, &(0x7f0000000200)={0xa, 0x4e21, 0x300, @dev={0xfe, 0x80, [], 0x14}, 0x7}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x10000000, @ipv4={[], [], @local}, 0x100000001}, 0xf) r2 = socket$inet6(0xa, 0x3, 0x3a) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000380)=[0x4, 0xca8c]) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000300)=0xbe, &(0x7f0000000340)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2, 0x8}}, 0x8001, 0x1000}, &(0x7f00000004c0)=0x90) ioctl$BINDER_THREAD_EXIT(r3, 0x40046208, 0x0) shmget$private(0x0, 0x4000, 0x78000202, &(0x7f0000ff9000/0x4000)=nil) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000140)={0x9, 0x1, 0x7, 0x1200000, 0xfffffffffffffff8}, 0xc) sendto$inet6(r0, &(0x7f00000005c0)="cb9650ea190af8a95b8a2ee3fb89372bc3968c2a38916255e4f76b8ebf847ac4f1ef53c64bb8e89f0a448177cbc2bf70415adaadeb06d0bdd0d1eafced1e283388c5f8ae610b6a4245b4ae3aea5b8827d45d83c3394ed98d56c1622a37c0b90b240401c13575355ae7ecce745b5a4fdf81b16504a8990aa4", 0x78, 0x800, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r5, &(0x7f0000000100)={&(0x7f0000000080)=@nl=@kern={0x10, 0x7003, 0x6c00000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000240)="5500000018007f5e00fe01b2a4a280930a600800ffa84302910000002d00090023000c000b0000000d000500fe8000000000c78b80082314ef440b9d56688500009b84136eb75afb83de4400000000000000000000", 0x55}], 0x1, &(0x7f0000000080)}, 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000940)) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000001800)=ANY=[], &(0x7f00000003c0)) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000500)={r4, @in6={{0xa, 0x4e21, 0x4, @mcast2, 0x1}}}, 0x84) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000640)={'bcsh0\x00', {0x2, 0x4e21}}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r3, 0x4010640d, &(0x7f00000000c0)={0x0, 0x3617}) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e21, 0xfe, @ipv4={[], [], @multicast1}, 0x9}, {0xa, 0x4e23, 0x10000000000007a, @mcast1, 0x4}, 0x2000005, [0x4, 0xb, 0x6, 0x3, 0x0, 0x6, 0x0, 0x2]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}, 0x7, [0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff]}, 0x5c) 19:38:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x1000000]}}}]}, 0x30}}, 0x0) 19:38:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}]}, 0x70}}, 0x0) [ 861.341553] audit: type=1326 audit(1545075532.165:672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1852 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x9000000]}}}]}, 0x30}}, 0x0) 19:38:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 861.438293] netlink: 9 bytes leftover after parsing attributes in process `syz-executor0'. [ 861.441561] audit: type=1326 audit(1545075532.225:673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1865 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x2000000]}}}]}, 0x30}}, 0x0) [ 861.555595] netlink: 9 bytes leftover after parsing attributes in process `syz-executor0'. [ 861.579851] audit: type=1326 audit(1545075532.395:674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1877 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:52 executing program 2 (fault-call:5 fault-nth:2): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}]}, 0x70}}, 0x0) 19:38:52 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x200000088) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x13, &(0x7f0000000000)={@mcast1}, &(0x7f0000000040)=0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000fbef6d)=""/185, 0xfffffffffffffeba, 0x0, 0x0, 0x1fe) sendto$inet6(r1, &(0x7f0000000800)="77772a0bd31622e24b1f16e07ce40e12872e3637e157d5847cd0e4fd5c54e58bacd24ac68385a2e2f93468221d4b20029b950c08648c47d645122d9400a16ebd809a0045713dda8b06af50702d3338c98f2565aee44a1c67a5db987cfe1deb8b4643dc020fe400ec44f08128901b17869e1dad43eeb6e4d4ecd5ecccea67a84338d8a58dc9c5770ede7af7b73903a6f69831181b524b6748442028019b04dac2e7203f6abaa4bb75048c9d2d297699437e851061d998fe4bd4f28f1b3a2c91e4b2273a61e0e7ed54e2a759db09225bd0ad2677d59c62dd972b18725d6f4556a966b8d707c1913ddc93921afde82b7a40968d4c3796c6b1bad1fb2fb9df770d9d88b9e615891a08356254ba1625e26133f31e71d7a8a7a2ba38db3699145c48dbe89cbe20709eca902485b1f3f5c49eef3835f407974ae1e95a72853af813336e00c6282e7dbfda98966db0694cda728dc44550de05f7e2ada24384ddf874f11e2f7f0a00488d8e548767c3266525f2cae7f2ccbee7b367badaf7d61c89c4be39e2b30bae5d257ebd003ae26aeaf07233712c243969d8201364ad5ec28dac9fecd028cb20d50f85fb08171f3746090d717aa27133684289c3dabe07a5c0007a8d373be70d73943e0788427dc72c5f3fb774b5d8bcfc381bfda4924aabd93caedf8dd74ca6ed8793680022df61a1a028f7d9391255af2bb019b2e3413fa748d394b8059c8fceebb92cb9a31a6948cad3a3312c011bec3e895e0020acd942cae558e17a4e5f602aaf4212e7a627310c58d6548ebb4b6341902e48f4b04c9f49f83058512235c6f47e43673eb6320aa81f1b751b19a32f5f25865e47a43d15f32aea04ef5023f527d92eccb92401c20787794d66b6eb571d120a246c65207b4ab09f9d31b85043899561ee431af468aac759ceeebc703aa4fbc3cf2ecee20c59aef2ce71729577446427c3b41e8bf5c6752e1236d6af6af1762bd6a1941d54329554b556a48017682eceb45be698c1d88718aae47fd5c458682bdc750e682ed4a277901a43a2827346fa789b4983af80334611a6f39ff155d0d78828247b667c620f1718a4cdf96ba1b4a550116ab6418b511ac8667527cd378e1f49be5496d9ae85cb6b8de202da926b065afbb6fc9e9b937e5950eac23dc1db5a8544156d87b6bf8e2c967cdca01d24c062f29877198a8ebda489b8fb78af4f3f96f895a91745a8d45c31a3be389587da185dca2077261d0876c6f9cb97e211090352385e0ae26f160b87278a22ae3690d5605be41939e9d59139509a2473f0d4737d13089b19c820f71d3a30153d913180981abc7ee672371e4f778d59f1066a47921600e7e5a5ad1d361f3cf845fe939ac8fa4247fc7c4682158b337f2209c68b78705c7f1169ccb693dcfa43166965bfe0f959a00713a4b453ac7aa386aba7d65ed72f4e6d046fddc6c8ae7750d8efa75f6a8574eeddb1894b0c0f832f7c72adf6d16b30cec38d01d6da0966d5c0d09c10eab4d591233ba3278a1a1dd737fd5005d5f2aa7e296acbff3e7256a5c1fe3ae7e6b6957e8ff9a18246a88cb9d00801a199e04aad4294593358a4b5a568f259ff405f7dbb76d4d6771ee1479696a887f2a09406d0089757d626237bdaf4f8b02b8444b6e137fed156ea681a50f62b4022ffa4dd49923af7c600451868da2f8aa687bb27b78fe3399b4c9a559c9bd9d6bead0ee668eb628842459e6688bebf8e49541e8761320b63088e3d4e036a6af8ba4344f3e79aaeffd25815c9e1114ce080e01b23d9e0578926cd80f607e69734a1ec520793d685164acbf0dfca495fc662549ea57c7f3a458c30ba25a2277a83c5b49d1ac8a334560962743e52e3d75945b8a9f24979a80cd69b327291b235df043fbf574d223d7e45a9fe61174fd247d3b45526f18fcf5e6bf093422e2dea22b64d6219a596a79d6e7cb14a415f21196c57da6c9cc80bfbce5b26db43c4b2b1ae951a0e0386e262b87af874b39cf1a43eee3e30994f62e8419964e456347a3dc6980bfb766f64944e328b853f11591dd999182e6c0736c4b0c279f468a8702720509f01d08beb15dd5a8430dd76b336a0df253504716128810ddd817892c112c6a75f00f6773d928a92b0eb859440ca539f5d7edcbc2ce84f6d7d88b9b585c9f3887c35ebf9d775c356e3bd8838662f4f5d6b387acbf4d58dd725e2e53591f1dd623c834a2a9c7165c929002336c1427e08fc9a970f2649e13de29747186e50caa238ba5b162f3be8d1de48dbf77116d85ddfc66bf1d6912bc04c840cbf25311f0302c22a606d96271a68e31b1dd5498d3bc150f65620f3a97dffe0c6b30c17ebd788a92f29c9e2d6d8c1fb9c1360c29b626bac313f2909ecd398cfabb1ecf6793099bc59041a6126b3ef09a6556e61237d2e8a8a6f10e6dbf6bf45564813fab7b9e4c67000616a1d54771e5d5b01706780ce5b78a4616234bea21ac685fea5d735e5f53d9bc8384fa488b7767142ed960b5e4038f549947cf3ad00e1b1d562c9f87ca71017b4f3e89486e662e8402b51afb033c4cf3373c15dac7f59610e25dd5d44d324dc53361a2c3eada0a5c4da46fbe99db6568ea5ffa2182d6a8e2e7c86c3fce334460ef9a2f707c3a893f8ef31e6c6129bb39f550869c7e52e732b12022a65739df008205c1c9f17ce6b868785bda97f4165a6fac6e13f0b0a95a19bfe2a568af42bac2a551ebb52c49e0d52d094c9d222d7359f7d084a52add1f265015abab9ce6ebe6fb3ea34af1f7ef9c0abce578a4c29628652b9f61d37907724af8696d321320c7f628d4100a477617f529225808e7cfc30c54330bbe20f0cb006818ed1e15a061adc2c3356b7b8293c9415657f44a08409d1b389dfebf0af0986a206d4b09c8997c70878ed113aceaefbe226e8ae47dc64b66189ee8ed30f617cf1b080beb0e510ce458d89f60c98ae05029248448505d444f7adb63f62b88b82a5fce015f4e81938af8d9ec1aa58821be341d9a0612e5e661f7fc1792d5dec77ad1cb20b732863acec274f1e95a37a706d63df3f91c595f881fe854d605d63eac140f4aaded60bc3f0e26341ccd820a3fac4ed991a758e6837b5036a33efd7f4084f25e951121e715b51254a1fe7cbc3e12125aba400e930006f406f44af18c4ae9081ebb9bf8aa0ba9c113b0dda046071d68d2a4125b5fc626d08b4b08f4d57db3b55a9575ed208863fccce43d2a813712ec0100b64f3ed74fcde07a4aea26d2dd1bf845f01aabdc0bd2f345a52d286b42d9143c083658e864dcf3525358667dfa897e90fb1f9b82d7fe6498f4477e14a4c2925201219cf7060540ef5b26fe3ebf7d0e40cbe5479ccae232882504f97e0e534d55e88650ce5b06f4f960d227a978a52f1545416f3ec05e2aaba59af9b27e0e1823fe6eac0586b80b02cbb80d8b44187bc92c8dfc1362f9f2b113ba35ed35ff64a3883d6addc1d4cf170485fe3a0ddf934a81317866ffb5e97632220beba1aead988a71b87384180997631eaf52855be15b3c55c05d0183eacf5cc34d56d2ed2e692b3866be0c5a7a6dda9d82fb6fbcbb8d76b7bd3b8b532a7c2025fe221ae5d2ddff7dbdb52d9ed9ec1a8d403cd2afc2fce7a18dd21241b5c01645a70c5b81de8e7e55363b3def5c0ab7f01591c884fc35040e5f2cf87f14697a588198d603713e53f763de9e862f656404af9701c2d832b3aef4602c7180c37324684496a3c7068168f0802ac9a13d78bd6f29db595d15ff64f6d85d3c2a91e440804a180399acdb80a787cdb94b6ba1bd5a04ca89f91674fb52f4ee2618d48dbc0836afc860dc1670cd66eec6e02e39dbd485ab375ea3351bb853b7adef74af2634225797d5a62067a370531748bf55099cdda6d265e01ec5408af8860163cf1a25859089450da48bdde0455659f0959b6f61662d8b0bd9d77774d4307737ffd4dd3f3a495e52d66d3b389bc1f65969af768314797af40fe68372d77230c868c6bb625f2d5a12fb8ab184d6194600c1929080146a4d7a871850e00c51a039bb0e07230aab390e9053c4860d73ca2d5e4fc6454e30a8e72b847fd7cb5b7a5c9fe53bb27312c38e81f286442e0cfbcbbda9f745608ef9b7112d44fc632e0f565aa128b1f2ef95654c484d6ba5408e7dfa4ace8ad3869494cc77138f7632423fa31fd1fed75cdbfa3811f2590a3f0573fb8bfac7b3ae193cb16e0d9859214f15233349e2e8f88d473995ea136aac975046c6dfbcd786ad2ae79fa663de8db2ee5a4ecc1aebbef6544ebacad732f398cd1bdc95699e0c52719ba0af40da48176daadb78a560cad1034934b53949a3577bcdee0edb0edd83df945ec43aee7538387b658b2821c2020565c86a179ad109a3e7082940be40788668bbe7b308b0e8a2d41ef9736d32d368a2fdc65d4a86bf7ac74df966dfb638afc64d9f5fd927ffea535c61e12b210e9864e949ad66953794e9d0220e62460fbb300fc49895e3dd021164a642c74f1d680c576882ebbf28c7467032e146ef249963ab6535eac9ba08c68bd3948e44c4f88c2045a215a597b63442b6e3b1bf9f9fa93c821eda8af2889853c0917b7ab49a95a1fe3851fa6ec7d2925d154c360e7cac206e375f854e7b90d710e7b0612378ab9f17641d19e9549ba4538694d4c57b5fa1bfb8fd5bc8268924033531fee868f259078e17ca6641498f5123dcbf7e062ef1986cd739280691f2105662e473b44737cf274227348d32184321fa97a210caa643529d9c44d8be0c8db9ca034e2d12469c3d1962a17e3e43805f90e83ead402a62aa9db1cebf5f947d33b02e091f1d01762b11df715989c9df865aa6151e7ef86c111fa75d906b9532712bcc58fb45e194aab1dbe4ae94a1e4cabd14b9a4705d4764d48bf8e3d54d933d9c7ffdb4fd382162b9a4e708589cc121d5373be07d0bf8010d9ff237ab7ff539f6854e11823f70a02bc656b0328fa921206521c5b7eaae51566140b968fb445004d1ab4ac4e99c1377ee0338c65f61e46e44f5efffcf1e9da66f598c747da33ae360df0d8d51fac9e802dfb3a273ebc6e34b2ba9d70ff160bf66df998483723a2c69f6a7ac0914f3096e897ecd61aee7dd000f6b43ed9bada505158edc0e232ee0e0fbf0db957d8646266950a543762bc61c84d9cdb197767520d05c59b6e8e12a71fb77e1f553bc5de52d8c9d6e6f8c01440dad6dd14c64904a17fccf14e201585cab8ad6d91006f2294b44a884e5f0b1a442c1b72da4ad6b9a8eb8bd9e1551fd907d6ca246ba81fb9406b021ceb472e3c52fc4028c880a9aa99f3a64ba8dfc42e3cfa0d9c6a96ea64524ec07cd7e677ff6407e1156c8168408c86814e8d270603dcd3e2d206d8a108f3897399bec8b4f397b0ee62a1f76ed21e6d9b499f3f039334d8210357134334e159dcf2b5164ea7300883a0f60d554ea9b68176305573197d5c15bc538535b1e2eb22bd1a8ce702ad692d80a30648847da2a55ee496f590088bb0a6b51b8b79e59b1332f94c803a65c4ba29b4e7ae21e4ce284b888a81abe858732d54faf30eb7219ebaaeab59098881a797a622ae585ebcf7ebdc4d26084f844d53d088e9bd4d74a151236ec990a7d76212a3bad933701f941364ea0040fc16518435abe001d18ccfc3dedb64a3c4dbd8714f14833ba4356549f0274a0fcd43cc588a7a9da0bf329043440d89257f24e9935d7c90603d590714a3eaa23c8e1866fb5f189f278a76d0a09a39f8529e24d9b6485320609630de4ccc978fb3cfe6837179cd92bc43a3f6685cbc9276523ca9", 0x1000, 0x0, &(0x7f0000000200)={0xa, 0x4e21, 0x300, @dev={0xfe, 0x80, [], 0x14}, 0x7}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x10000000, @ipv4={[], [], @local}, 0x100000001}, 0xf) r2 = socket$inet6(0xa, 0x3, 0x3a) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000380)=[0x4, 0xca8c]) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000300)=0xbe, &(0x7f0000000340)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2, 0x8}}, 0x8001, 0x1000}, &(0x7f00000004c0)=0x90) ioctl$BINDER_THREAD_EXIT(r3, 0x40046208, 0x0) shmget$private(0x0, 0x4000, 0x78000202, &(0x7f0000ff9000/0x4000)=nil) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000140)={0x9, 0x1, 0x7, 0x1200000, 0xfffffffffffffff8}, 0xc) sendto$inet6(r0, &(0x7f00000005c0)="cb9650ea190af8a95b8a2ee3fb89372bc3968c2a38916255e4f76b8ebf847ac4f1ef53c64bb8e89f0a448177cbc2bf70415adaadeb06d0bdd0d1eafced1e283388c5f8ae610b6a4245b4ae3aea5b8827d45d83c3394ed98d56c1622a37c0b90b240401c13575355ae7ecce745b5a4fdf81b16504a8990aa4", 0x78, 0x800, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r5, &(0x7f0000000100)={&(0x7f0000000080)=@nl=@kern={0x10, 0x7003, 0x6c00000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000240)="5500000018007f5e00fe01b2a4a280930a600800ffa84302910000002d00090023000c000b0000000d000500fe8000000000c78b80082314ef440b9d56688500009b84136eb75afb83de4400000000000000000000", 0x55}], 0x1, &(0x7f0000000080)}, 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000940)) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000001800)=ANY=[], &(0x7f00000003c0)) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000500)={r4, @in6={{0xa, 0x4e21, 0x4, @mcast2, 0x1}}}, 0x84) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000640)={'bcsh0\x00', {0x2, 0x4e21}}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r3, 0x4010640d, &(0x7f00000000c0)={0x0, 0x3617}) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e21, 0xfe, @ipv4={[], [], @multicast1}, 0x9}, {0xa, 0x4e23, 0x10000000000007a, @mcast1, 0x4}, 0x2000005, [0x4, 0xb, 0x6, 0x3, 0x0, 0x6, 0x0, 0x2]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}, 0x7, [0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff]}, 0x5c) 19:38:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x13000000]}}}]}, 0x30}}, 0x0) [ 861.789191] IPVS: ftp: loaded support on port[0] = 21 19:38:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}}]}, 0x70}}, 0x0) [ 861.943520] netlink: 9 bytes leftover after parsing attributes in process `syz-executor0'. [ 862.205733] audit: type=1326 audit(1545075533.025:675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1865 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 862.241535] FAULT_INJECTION: forcing a failure. [ 862.241535] name failslab, interval 1, probability 0, space 0, times 0 [ 862.253355] CPU: 0 PID: 1891 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #155 [ 862.260674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 862.270056] Call Trace: [ 862.272689] dump_stack+0x244/0x39d [ 862.276354] ? dump_stack_print_info.cold.1+0x20/0x20 [ 862.281592] ? perf_trace_lock+0x4a7/0x7a0 [ 862.285885] should_fail.cold.4+0xa/0x17 [ 862.289974] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 862.295109] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 862.300062] ? rcu_softirq_qs+0x20/0x20 [ 862.304052] ? rcu_softirq_qs+0x20/0x20 [ 862.308040] ? unwind_dump+0x190/0x190 [ 862.312059] ? find_held_lock+0x36/0x1c0 [ 862.316256] ? do_rename+0x2468/0x24f0 [ 862.320240] ? perf_trace_sched_process_exec+0x860/0x860 [ 862.325713] ? save_stack+0x43/0xd0 [ 862.329363] ? kvmalloc_node+0x65/0xf0 [ 862.333322] ? xt_alloc_table_info+0x42/0xa0 [ 862.337759] __should_failslab+0x124/0x180 [ 862.342017] should_failslab+0x9/0x14 [ 862.345847] kmem_cache_alloc_node_trace+0x270/0x740 [ 862.350993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 862.356551] ? check_preemption_disabled+0x48/0x280 [ 862.361603] __kmalloc_node+0x3c/0x70 [ 862.365443] kvmalloc_node+0x65/0xf0 [ 862.369182] xt_alloc_entry_offsets+0x3f/0x50 [ 862.373709] translate_table+0x243/0x1760 [ 862.378110] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 862.383472] ? kasan_unpoison_shadow+0x35/0x50 [ 862.388115] ? kasan_kmalloc+0xc7/0xe0 [ 862.392032] ? do_add_counters+0x600/0x600 [ 862.396316] ? memset+0x31/0x40 [ 862.399625] ipt_register_table+0x18f/0x3f0 [ 862.403973] ? translate_table+0x1760/0x1760 [ 862.408403] ? rcu_read_lock_sched_held+0x14f/0x180 [ 862.413466] ? __kmalloc+0x5ee/0x760 [ 862.417197] ? __might_fault+0x12b/0x1e0 [ 862.421298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 862.426853] ? ipt_alloc_initial_table+0x560/0x670 [ 862.431810] iptable_raw_table_init+0xb0/0xd0 [ 862.436331] xt_find_table_lock+0x296/0x430 [ 862.440707] xt_request_find_table_lock+0x2b/0xe0 [ 862.445576] get_info+0x17a/0x6f0 [ 862.449058] ? compat_table_info+0x4c0/0x4c0 [ 862.453488] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 862.458786] ? lock_is_held_type+0x210/0x210 [ 862.463206] ? check_preemption_disabled+0x48/0x280 [ 862.468264] ? selinux_capable+0x36/0x40 [ 862.472358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 862.477924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 862.483482] ? ns_capable_common+0x13f/0x170 [ 862.487920] do_ipt_get_ctl+0x176/0xbc0 [ 862.491932] ? alloc_counters.isra.11+0x830/0x830 [ 862.496791] ? __might_fault+0x12b/0x1e0 [ 862.500873] ? lock_downgrade+0x900/0x900 [ 862.505045] ? lock_release+0xa00/0xa00 [ 862.509220] ? perf_trace_sched_process_exec+0x860/0x860 [ 862.514736] ? mutex_unlock+0xd/0x10 [ 862.518479] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 862.523788] nf_getsockopt+0x80/0xe0 [ 862.527529] ip_getsockopt+0x1af/0x240 [ 862.531452] ? do_ip_getsockopt+0x2470/0x2470 [ 862.536041] udp_getsockopt+0x62/0xa0 [ 862.539907] sock_common_getsockopt+0x9a/0xe0 [ 862.544448] __sys_getsockopt+0x1ad/0x390 [ 862.548638] ? kernel_setsockopt+0x1d0/0x1d0 [ 862.553079] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 862.557686] ? trace_hardirqs_on+0xbd/0x310 [ 862.562030] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 862.567419] ? trace_hardirqs_off_caller+0x310/0x310 [ 862.572569] __x64_sys_getsockopt+0xbe/0x150 [ 862.577004] do_syscall_64+0x1b9/0x820 [ 862.580909] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 862.586294] ? syscall_return_slowpath+0x5e0/0x5e0 [ 862.591279] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 862.596146] ? trace_hardirqs_on_caller+0x310/0x310 [ 862.601195] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 862.606244] ? prepare_exit_to_usermode+0x291/0x3b0 [ 862.611304] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 862.616181] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 862.621384] RIP: 0033:0x457669 [ 862.624602] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 862.643514] RSP: 002b:00007fec09d27c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 862.651279] RAX: ffffffffffffffda RBX: 00007fec09d27c90 RCX: 0000000000457669 [ 862.658591] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000005 [ 862.665873] RBP: 000000000072bf00 R08: 0000000020000440 R09: 0000000000000000 [ 862.673153] R10: 0000000020000200 R11: 0000000000000246 R12: 00007fec09d286d4 [ 862.680442] R13: 00000000004be32a R14: 00000000004ce388 R15: 0000000000000006 19:38:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x42, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xf0ffff]}}}]}, 0x30}}, 0x0) 19:38:53 executing program 0: ptrace$setopts(0x4200, 0x0, 0x6, 0x1) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") mkdir(&(0x7f0000000880)='./file0\x00', 0x800000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0), 0x0, 0xfffffffffffffffe}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}}}}, 0xa5e0936e7f46bf5c) epoll_create1(0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) futex(&(0x7f0000000140), 0x8b, 0x2, &(0x7f00000002c0)={r1, r2+10000000}, &(0x7f0000000300), 0x2) fchmodat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f0000000640)) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x7ff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0xfffffffffffffd14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, 0x0, 0xfffffffffffffdb6) clone(0x3005, 0x0, 0xfffffffffffffffe, &(0x7f0000000900), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0xffffffffffffff10, &(0x7f0000000380)}, &(0x7f0000000540)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'bond0\x00', {0x2, 0x4e23, @dev}}) socket$can_bcm(0x1d, 0x2, 0x2) getpid() prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000380)={0x0, 0x7, 0x4}) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000440)={0x14, 0x11, 0xffffffffffffffff, {0x20}}, 0xfffffffffffffc3d) 19:38:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}]}, 0x70}}, 0x0) [ 862.693625] audit: type=1326 audit(1545075533.515:676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1877 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 862.836880] audit: type=1326 audit(1545075533.655:677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1911 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0xf]}}}]}, 0x30}}, 0x0) 19:38:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x2000000]}}}]}, 0x70}}, 0x0) [ 862.932720] audit: type=1326 audit(1545075533.735:678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1919 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:53 executing program 2 (fault-call:5 fault-nth:3): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x10]}}}]}, 0x30}}, 0x0) 19:38:54 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x400300]}}}]}, 0x70}}, 0x0) 19:38:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x1001000000000000]}}}]}, 0x30}}, 0x0) [ 863.369214] IPVS: ftp: loaded support on port[0] = 21 19:38:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x80ffffff00000000]}}}]}, 0x30}}, 0x0) [ 863.581197] audit: type=1326 audit(1545075534.405:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1911 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x10000000000000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:54 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x8000000]}}}]}, 0x70}}, 0x0) [ 863.710259] audit: type=1326 audit(1545075534.525:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1919 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 863.818873] FAULT_INJECTION: forcing a failure. [ 863.818873] name failslab, interval 1, probability 0, space 0, times 0 [ 863.838524] CPU: 1 PID: 1941 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #155 [ 863.845827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 863.855197] Call Trace: [ 863.857809] dump_stack+0x244/0x39d [ 863.861471] ? dump_stack_print_info.cold.1+0x20/0x20 [ 863.866677] ? debug_smp_processor_id+0x1c/0x20 [ 863.871344] ? perf_trace_lock+0x14d/0x7a0 [ 863.875575] should_fail.cold.4+0xa/0x17 [ 863.879645] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 863.884807] ? xt_check_target+0x2aa/0x6f0 [ 863.889040] ? textify_hooks.constprop.13+0x190/0x190 [ 863.894221] ? __kasan_slab_free+0x102/0x150 [ 863.898630] ? kfree+0xcf/0x230 [ 863.901899] ? kvfree+0x61/0x70 [ 863.905167] ? translate_table+0xc2e/0x1760 [ 863.909490] ? find_held_lock+0x36/0x1c0 [ 863.913578] ? perf_trace_sched_process_exec+0x860/0x860 [ 863.919039] ? ipt_do_table+0x1bc0/0x1bc0 [ 863.923185] __should_failslab+0x124/0x180 [ 863.927423] should_failslab+0x9/0x14 [ 863.931216] __kmalloc_track_caller+0x2d1/0x760 [ 863.935883] ? xt_register_table+0xad/0x690 [ 863.940202] kmemdup+0x24/0x50 [ 863.943389] xt_register_table+0xad/0x690 [ 863.947591] ? xt_replace_table+0x9e0/0x9e0 [ 863.951917] ? do_add_counters+0x600/0x600 [ 863.956143] ? memset+0x31/0x40 [ 863.959425] ipt_register_table+0x21a/0x3f0 [ 863.963746] ? translate_table+0x1760/0x1760 [ 863.968167] ? rcu_read_lock_sched_held+0x14f/0x180 [ 863.973201] ? __kmalloc+0x5ee/0x760 [ 863.976908] ? __might_fault+0x12b/0x1e0 [ 863.980970] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 863.986513] ? ipt_alloc_initial_table+0x560/0x670 [ 863.991445] iptable_raw_table_init+0xb0/0xd0 [ 863.995941] xt_find_table_lock+0x296/0x430 [ 864.000332] xt_request_find_table_lock+0x2b/0xe0 [ 864.005190] get_info+0x17a/0x6f0 [ 864.008654] ? compat_table_info+0x4c0/0x4c0 [ 864.013090] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 864.018394] ? lock_is_held_type+0x210/0x210 [ 864.022832] ? check_preemption_disabled+0x48/0x280 [ 864.027861] ? selinux_capable+0x36/0x40 [ 864.031925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 864.037468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 864.043128] ? ns_capable_common+0x13f/0x170 [ 864.047533] do_ipt_get_ctl+0x176/0xbc0 [ 864.051534] ? alloc_counters.isra.11+0x830/0x830 [ 864.056379] ? __might_fault+0x12b/0x1e0 [ 864.060455] ? lock_downgrade+0x900/0x900 [ 864.064627] ? lock_release+0xa00/0xa00 [ 864.068606] ? perf_trace_sched_process_exec+0x860/0x860 [ 864.074068] ? mutex_unlock+0xd/0x10 [ 864.077796] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 864.083100] nf_getsockopt+0x80/0xe0 [ 864.086820] ip_getsockopt+0x1af/0x240 [ 864.090719] ? do_ip_getsockopt+0x2470/0x2470 [ 864.095216] udp_getsockopt+0x62/0xa0 [ 864.099013] sock_common_getsockopt+0x9a/0xe0 [ 864.103524] __sys_getsockopt+0x1ad/0x390 [ 864.107677] ? kernel_setsockopt+0x1d0/0x1d0 [ 864.112109] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 864.116683] ? trace_hardirqs_on+0xbd/0x310 [ 864.121007] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 864.126399] ? trace_hardirqs_off_caller+0x310/0x310 [ 864.131527] __x64_sys_getsockopt+0xbe/0x150 [ 864.135960] do_syscall_64+0x1b9/0x820 [ 864.139851] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 864.145213] ? syscall_return_slowpath+0x5e0/0x5e0 [ 864.150134] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 864.154970] ? trace_hardirqs_on_caller+0x310/0x310 [ 864.159999] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 864.165015] ? prepare_exit_to_usermode+0x291/0x3b0 [ 864.170041] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 864.174893] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 864.180073] RIP: 0033:0x457669 [ 864.183267] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 864.202157] RSP: 002b:00007fec09d27c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 864.209882] RAX: ffffffffffffffda RBX: 00007fec09d27c90 RCX: 0000000000457669 [ 864.217152] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000005 [ 864.224423] RBP: 000000000072bf00 R08: 0000000020000440 R09: 0000000000000000 [ 864.231696] R10: 0000000020000200 R11: 0000000000000246 R12: 00007fec09d286d4 [ 864.238965] R13: 00000000004be32a R14: 00000000004ce388 R15: 0000000000000006 19:38:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x2, &(0x7f0000000900)=ANY=[@ANYBLOB="18100000", @ANYRES32=r0, @ANYBLOB="00000000000000002ee61d2dc1d9ce12844aa67ee2823d3bf5fb78a74e804e628f1cc4c45d77c304ea277791359de8d7f6db3c907e342c44723fb3146c26f8c2fc68fade1b1526511cf87501a20628b7a6069e091fa4384dade77b7ffa47d1df52c7c60bfc51c6ba2ef4f6414b66e56716636666a6def68e02b56e644c8a9d554734cb28a35f3ff1e58d539c52d9169fe2903fe5e25fdf0de1a8d42b5152ef6cd0b09611ec99409b9dd2894f3b24ef38054e0edf281c06d697c8f6db337210f5cf82bfc928bf3700000000"], &(0x7f0000000140)='GPL\x00', 0xffffffffffffff82, 0xa0, &(0x7f0000000400)=""/160, 0x0, 0x1}, 0x48) ioctl$KVM_RUN(r0, 0xae80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000013c0)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000014c0)=0xe8) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000700)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}, 0x6}, @in={0x2, 0x4e23, @remote}], 0x2c) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000bc0)={@sco={0x1f, {0x0, 0x0, 0x5, 0x0, 0x8}}, {&(0x7f0000000ac0)=""/228, 0xe4}, &(0x7f00000008c0), 0x6}, 0xa0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000540)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}]}, 0x88) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x48}}}}}}}, &(0x7f0000000000)) mknod(&(0x7f0000000a00)='./file0\x00', 0x461, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f00000006c0), &(0x7f0000000640)=[&(0x7f0000000240)=']\x00']) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) lsetxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='security.SMACK64IPIN\x00', &(0x7f00000004c0)='keyring-)em0[vboxnet1security\x00', 0x1e, 0x1) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='d\xd1tnp\x00{\x14+\x87\xf9\x19\xb8\x98_\xc0\xc3\x02\xde\xfd,a\t7\xfb\"2@\x04!\xa2=}\x1b\x0f\x8c\xfa\xad\x10\xf5\xff\x1f\x8a\xeb', 0x2c) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, &(0x7f0000000200)={0xffffffffffffffff, 0x5}) creat(&(0x7f0000000800)='./file0\x00', 0x40) 19:38:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x12000000]}}}]}, 0x30}}, 0x0) 19:38:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x8]}}}]}, 0x70}}, 0x0) 19:38:57 executing program 2 (fault-call:5 fault-nth:4): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x2000000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 866.680045] kauditd_printk_skb: 2 callbacks suppressed [ 866.680061] audit: type=1326 audit(1545075537.495:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1973 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 866.686295] IPVS: ftp: loaded support on port[0] = 21 19:38:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x2]}}}]}, 0x30}}, 0x0) [ 866.719801] audit: type=1326 audit(1545075537.535:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1975 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xf]}}}]}, 0x30}}, 0x0) 19:38:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x4]}}}]}, 0x70}}, 0x0) 19:38:57 executing program 0: mkdir(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2a, 0x6, 0x0, {0x1, 0x0, 0x1, 0x0, '&'}}, 0x2a) r1 = getuid() lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x20040, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read', 0x3d, 0xe3b}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@allow_other='allow_other'}], [{@dont_appraise='dont_appraise'}, {@uid_lt={'uid<', r3}}, {@appraise_type='appraise_type=imasig'}, {@appraise_type='appraise_type=imasig'}]}}) read$FUSE(r0, 0x0, 0x0) 19:38:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xf0ffffff]}}}]}, 0x30}}, 0x0) 19:38:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x34000]}}}]}, 0x70}}, 0x0) 19:38:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x8000000]}}}]}, 0x30}}, 0x0) [ 867.266016] FAULT_INJECTION: forcing a failure. [ 867.266016] name failslab, interval 1, probability 0, space 0, times 0 [ 867.279472] CPU: 0 PID: 1977 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #155 [ 867.286768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 867.286800] Call Trace: [ 867.286833] dump_stack+0x244/0x39d [ 867.286866] ? dump_stack_print_info.cold.1+0x20/0x20 [ 867.286899] ? perf_trace_lock+0x4a7/0x7a0 [ 867.286935] should_fail.cold.4+0xa/0x17 [ 867.286968] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 867.287003] ? is_bpf_text_address+0xd3/0x170 [ 867.299164] ? zap_class+0x640/0x640 [ 867.299188] ? __mutex_lock+0x85e/0x16f0 [ 867.299216] ? xt_register_table+0xf8/0x690 [ 867.299248] ? find_held_lock+0x36/0x1c0 [ 867.299280] ? __lock_is_held+0xb5/0x140 [ 867.299368] ? add_new_disk+0x17c8/0x18e0 [ 867.312397] ? __sys_getsockopt+0x1ad/0x390 [ 867.312444] ? perf_trace_sched_process_exec+0x860/0x860 [ 867.312483] ? find_held_lock+0x36/0x1c0 [ 867.312523] __should_failslab+0x124/0x180 [ 867.321705] should_failslab+0x9/0x14 [ 867.321727] __kmalloc+0x2e0/0x760 [ 867.321760] ? xt_replace_table+0x684/0x9e0 [ 867.321795] xt_replace_table+0x684/0x9e0 [ 867.321845] ? xt_check_match+0x6f0/0x6f0 [ 867.330098] ? __kmalloc_track_caller+0x5eb/0x760 [ 867.330154] xt_register_table+0x328/0x690 [ 867.330186] ? xt_replace_table+0x9e0/0x9e0 [ 867.330215] ? do_add_counters+0x600/0x600 [ 867.330240] ? memset+0x31/0x40 [ 867.330269] ipt_register_table+0x21a/0x3f0 [ 867.338641] ? translate_table+0x1760/0x1760 [ 867.338688] ? rcu_read_lock_sched_held+0x14f/0x180 [ 867.338711] ? __kmalloc+0x5ee/0x760 [ 867.338734] ? __might_fault+0x12b/0x1e0 [ 867.338773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 867.360742] ? ipt_alloc_initial_table+0x560/0x670 [ 867.369035] iptable_raw_table_init+0xb0/0xd0 [ 867.446132] xt_find_table_lock+0x296/0x430 [ 867.450478] xt_request_find_table_lock+0x2b/0xe0 [ 867.455374] get_info+0x17a/0x6f0 [ 867.458831] ? compat_table_info+0x4c0/0x4c0 [ 867.463238] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 867.468546] ? lock_is_held_type+0x210/0x210 [ 867.472966] ? check_preemption_disabled+0x48/0x280 [ 867.478025] ? selinux_capable+0x36/0x40 [ 867.482101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 867.487657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 867.493225] ? ns_capable_common+0x13f/0x170 [ 867.497641] do_ipt_get_ctl+0x176/0xbc0 [ 867.501624] ? alloc_counters.isra.11+0x830/0x830 [ 867.506467] ? __might_fault+0x12b/0x1e0 [ 867.510538] ? lock_downgrade+0x900/0x900 [ 867.514754] ? lock_release+0xa00/0xa00 [ 867.518725] ? perf_trace_sched_process_exec+0x860/0x860 [ 867.524202] ? mutex_unlock+0xd/0x10 [ 867.527944] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 867.533239] nf_getsockopt+0x80/0xe0 [ 867.536954] ip_getsockopt+0x1af/0x240 [ 867.540843] ? do_ip_getsockopt+0x2470/0x2470 [ 867.545433] udp_getsockopt+0x62/0xa0 [ 867.549260] sock_common_getsockopt+0x9a/0xe0 [ 867.553773] __sys_getsockopt+0x1ad/0x390 [ 867.557925] ? kernel_setsockopt+0x1d0/0x1d0 [ 867.562341] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 867.566921] ? trace_hardirqs_on+0xbd/0x310 [ 867.571250] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 867.576636] ? trace_hardirqs_off_caller+0x310/0x310 [ 867.581779] __x64_sys_getsockopt+0xbe/0x150 [ 867.586257] do_syscall_64+0x1b9/0x820 [ 867.590169] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 867.595564] ? syscall_return_slowpath+0x5e0/0x5e0 [ 867.600523] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 867.605451] ? trace_hardirqs_on_caller+0x310/0x310 [ 867.610498] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 867.615533] ? prepare_exit_to_usermode+0x291/0x3b0 [ 867.620578] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 867.625469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 867.630663] RIP: 0033:0x457669 [ 867.633860] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 867.652767] RSP: 002b:00007fec09d27c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 867.660487] RAX: ffffffffffffffda RBX: 00007fec09d27c90 RCX: 0000000000457669 [ 867.667753] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000005 [ 867.675014] RBP: 000000000072bf00 R08: 0000000020000440 R09: 0000000000000000 [ 867.682289] R10: 0000000020000200 R11: 0000000000000246 R12: 00007fec09d286d4 [ 867.689566] R13: 00000000004be32a R14: 00000000004ce388 R15: 0000000000000006 [ 867.704484] audit: type=1326 audit(1545075538.525:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=1973 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x500]}}}]}, 0x30}}, 0x0) 19:38:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x2]}}}]}, 0x70}}, 0x0) 19:38:58 executing program 2 (fault-call:5 fault-nth:5): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:38:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x4200, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x9]}}}]}, 0x30}}, 0x0) [ 867.857608] audit: type=1326 audit(1545075538.675:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2024 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 867.941290] audit: type=1326 audit(1545075538.725:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2026 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:58 executing program 0: unshare(0x8000400) r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x100000001, 0x101080) r1 = dup2(r0, r0) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000200)=""/72) r2 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x71a}) mq_timedsend(r2, &(0x7f0000000380), 0x0, 0x0, &(0x7f0000000040)) mq_timedsend(r2, &(0x7f00000000c0), 0x0, 0x4, &(0x7f00000001c0)) mq_timedreceive(r2, &(0x7f00000011c0)=""/4096, 0x1000, 0x1000, &(0x7f0000000080)) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f00000021c0)=""/4096) r3 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x0, 0x400000) write$P9_RATTACH(r3, &(0x7f00000000c0)={0x24, 0x69, 0x1, {0x1, 0x0, 0x8}}, 0x14) 19:38:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}]}, 0x70}}, 0x0) [ 867.988260] IPVS: ftp: loaded support on port[0] = 21 19:38:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x10]}}}]}, 0x30}}, 0x0) 19:38:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]}}}]}, 0x70}}, 0x0) 19:38:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xa]}}}]}, 0x30}}, 0x0) 19:38:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) shutdown(r2, 0x0) ioctl$int_out(r2, 0x2, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) tkill(r0, 0x1004000000016) [ 868.570277] FAULT_INJECTION: forcing a failure. [ 868.570277] name failslab, interval 1, probability 0, space 0, times 0 [ 868.583240] CPU: 0 PID: 2033 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #155 [ 868.590553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 868.599923] Call Trace: [ 868.602544] dump_stack+0x244/0x39d [ 868.606215] ? dump_stack_print_info.cold.1+0x20/0x20 [ 868.611448] ? perf_trace_lock+0x4a7/0x7a0 [ 868.615733] should_fail.cold.4+0xa/0x17 [ 868.619825] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 868.624979] ? zap_class+0x640/0x640 [ 868.628716] ? save_stack+0xa9/0xd0 [ 868.632377] ? save_stack+0x43/0xd0 [ 868.636030] ? kasan_kmalloc+0xc7/0xe0 [ 868.639938] ? __kmalloc+0x15b/0x760 [ 868.643691] ? find_held_lock+0x36/0x1c0 [ 868.647790] ? __lock_is_held+0xb5/0x140 [ 868.651917] ? perf_trace_sched_process_exec+0x860/0x860 [ 868.657416] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 868.662998] ? check_preemption_disabled+0x48/0x280 [ 868.668060] __should_failslab+0x124/0x180 [ 868.672367] should_failslab+0x9/0x14 [ 868.676190] kmem_cache_alloc_node_trace+0x270/0x740 [ 868.681341] __kmalloc_node+0x3c/0x70 [ 868.685199] kvmalloc_node+0x65/0xf0 [ 868.688946] xt_replace_table+0x222/0x9e0 [ 868.693151] ? xt_check_match+0x6f0/0x6f0 [ 868.697339] ? __kmalloc_track_caller+0x5eb/0x760 [ 868.702244] xt_register_table+0x328/0x690 [ 868.706516] ? xt_replace_table+0x9e0/0x9e0 [ 868.710873] ? do_add_counters+0x600/0x600 [ 868.715135] ? memset+0x31/0x40 [ 868.718457] ipt_register_table+0x21a/0x3f0 [ 868.722812] ? translate_table+0x1760/0x1760 [ 868.727280] ? rcu_read_lock_sched_held+0x14f/0x180 [ 868.732335] ? __kmalloc+0x5ee/0x760 [ 868.736078] ? __might_fault+0x12b/0x1e0 [ 868.740182] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 868.745744] ? ipt_alloc_initial_table+0x560/0x670 [ 868.750713] iptable_raw_table_init+0xb0/0xd0 [ 868.755242] xt_find_table_lock+0x296/0x430 [ 868.759608] xt_request_find_table_lock+0x2b/0xe0 [ 868.764479] get_info+0x17a/0x6f0 [ 868.767965] ? compat_table_info+0x4c0/0x4c0 [ 868.772403] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 868.777729] ? lock_is_held_type+0x210/0x210 [ 868.782176] ? check_preemption_disabled+0x48/0x280 [ 868.787230] ? selinux_capable+0x36/0x40 [ 868.791323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 868.796919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 868.802481] ? ns_capable_common+0x13f/0x170 [ 868.806928] do_ipt_get_ctl+0x176/0xbc0 [ 868.810948] ? alloc_counters.isra.11+0x830/0x830 [ 868.815814] ? __might_fault+0x12b/0x1e0 [ 868.819914] ? lock_downgrade+0x900/0x900 [ 868.824120] ? lock_release+0xa00/0xa00 [ 868.828115] ? perf_trace_sched_process_exec+0x860/0x860 [ 868.833610] ? mutex_unlock+0xd/0x10 [ 868.837344] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 868.842651] nf_getsockopt+0x80/0xe0 [ 868.846401] ip_getsockopt+0x1af/0x240 [ 868.850326] ? do_ip_getsockopt+0x2470/0x2470 [ 868.854866] udp_getsockopt+0x62/0xa0 [ 868.858704] sock_common_getsockopt+0x9a/0xe0 [ 868.863231] __sys_getsockopt+0x1ad/0x390 [ 868.867417] ? kernel_setsockopt+0x1d0/0x1d0 [ 868.871854] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 868.876468] ? trace_hardirqs_on+0xbd/0x310 [ 868.880815] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 868.886202] ? trace_hardirqs_off_caller+0x310/0x310 [ 868.891343] __x64_sys_getsockopt+0xbe/0x150 [ 868.895787] do_syscall_64+0x1b9/0x820 [ 868.899712] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 868.905114] ? syscall_return_slowpath+0x5e0/0x5e0 [ 868.910063] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 868.914929] ? trace_hardirqs_on_caller+0x310/0x310 [ 868.919971] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 868.925010] ? prepare_exit_to_usermode+0x291/0x3b0 [ 868.930064] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 868.934944] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 868.940158] RIP: 0033:0x457669 [ 868.943398] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 868.962328] RSP: 002b:00007fec09d27c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 868.970054] RAX: ffffffffffffffda RBX: 00007fec09d27c90 RCX: 0000000000457669 [ 868.977341] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000005 [ 868.984725] RBP: 000000000072bf00 R08: 0000000020000440 R09: 0000000000000000 [ 868.992013] R10: 0000000020000200 R11: 0000000000000246 R12: 00007fec09d286d4 [ 868.999303] R13: 00000000004be32a R14: 00000000004ce388 R15: 0000000000000006 [ 869.009279] audit: type=1326 audit(1545075539.825:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2024 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:38:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:38:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x200000000000000]}}}]}, 0x30}}, 0x0) 19:38:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}}]}, 0x70}}, 0x0) [ 869.059719] audit: type=1326 audit(1545075539.875:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2026 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:00 executing program 2 (fault-call:5 fault-nth:6): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) shutdown(r2, 0x0) ioctl$int_out(r2, 0x2, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) tkill(r0, 0x1004000000016) 19:39:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x500, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x80ffffff]}}}]}, 0x30}}, 0x0) 19:39:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x1000000]}}}]}, 0x70}}, 0x0) [ 869.253935] audit: type=1326 audit(1545075540.075:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2069 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x1300]}}}]}, 0x30}}, 0x0) [ 869.368252] audit: type=1326 audit(1545075540.155:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2075 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 869.432420] IPVS: ftp: loaded support on port[0] = 21 19:39:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x3f00]}}}]}, 0x70}}, 0x0) 19:39:00 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000680)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000001c0)=""/17, 0x11}, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)={0x5, [0x7fffffff, 0xfffffffffffffff9, 0x0, 0xfff, 0xff]}, &(0x7f00000002c0)=0xe) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@vsock, 0xfffffffffffffef2, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/154, 0xfffffffffffffe95}], 0x1, &(0x7f0000000240)=""/105, 0x69}, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0xfffffec8, &(0x7f00000006c0)=[{&(0x7f0000000300)="b04c4fe01a5989c39650744d8b40e2ce28d3436f5c45ac34b03d8385ac43266de366659ceb00cd78a7840d98f7d20e03b65e98e6f613e5096b37af356d804e6ca7c8e907128e7b6ffb3e990aadbed83e2b611be073a02adf2dec2cc2681f3d7186598ea7efe48a2c0e810bd1c0e598310994b18240078a1381ec2e6da7fa50877d6d5900e9ec13e4f1aa79d33ecfa767143eb426d242bf849620b162d67c95c5bf04b7aa4ee0c572d629d00a6d17ebba85f984"}, {&(0x7f00000003c0)="ea6bbfa373b94997a244013420b7900555d954b2ac4847b395642b1aa6db427ad7a3d9b64a720d34c5eb6d17e7b3766d869436d217ee07e04f29fc7612a0efe5eff289c352da8c88c32752563639740e56ef53187f5d67f4632118e848b511d6ec474146787c1f3cd2074cee83c6c8bedce5dc43f4a920569a356ece6ec9b05d1d5f089a913487d0997404f7bc005a5977dbf20998c204fadf7ec312e1a18bad6e25ddaac1ba474299ff9b1f3e6645d670149bec8e73960f4875e22c03420d8224f8d51cb54c7b5d3550ecf9fcc2b2da0d75381803688748797511458d02ee054bffa4e5b8561c3d15262315a473"}, {&(0x7f00000004c0)="5a5e691b00efb2f103ba2558ff62f19f0b5ab8b1b0549141584f0162f420cd94a3281c549e88114ce7dfcaf5fbd73584502ad023471c79d08a9b86631ac6bb493e313eb2"}, {&(0x7f0000000540)="ce244b21d13efcd519286b2787967a01a346d05dfba08223a970330208c9da930ddc387dec8e7e5864e910b1b65278f0"}, {&(0x7f0000000580)="653d71dd1c60918a0b9d1f65752aa122c62ddb97a06fd5ada09a702d31c4f52f9531076461b812e772ca2fd8abd5a44c44ed2ed4f4b39ece44a1d7f0e8ad90cb12f3fbfb1570047552f74cfa2910c1d2df8f9bacf20b21511e723ab7bd7c2cdb48c9ee43dbfacc7de2b4ad1f8a60ebaf84e0f2d698e479ade84d71e9d6b5213dfb4ca0906a75473d3eef6515"}, {&(0x7f0000000640)="873ff51813d1bc71478b2b84202c23775c48cc47e4ed1dad8d65897195ecc34bec0083a2fcaae01590568afc98d999c95538cadee7eb1a76fba3a46216c4e0e4"}], 0x28a, &(0x7f0000000540), 0xfffffffffffffed4}, 0x0) recvmsg(r0, &(0x7f0000004d00)={&(0x7f0000004940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000004c00)=[{&(0x7f0000004b00)=""/243, 0x245}], 0x0, &(0x7f0000004c40)=""/181, 0xb5}, 0x42) 19:39:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xf00]}}}]}, 0x30}}, 0x0) [ 869.941986] FAULT_INJECTION: forcing a failure. [ 869.941986] name failslab, interval 1, probability 0, space 0, times 0 [ 869.953647] CPU: 0 PID: 2085 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #155 [ 869.960963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 869.970332] Call Trace: [ 869.972951] dump_stack+0x244/0x39d [ 869.976615] ? dump_stack_print_info.cold.1+0x20/0x20 [ 869.981841] ? perf_trace_lock+0x4a7/0x7a0 [ 869.986117] should_fail.cold.4+0xa/0x17 [ 869.990210] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 869.995345] ? unwind_get_return_address+0x61/0xa0 [ 870.000376] ? zap_class+0x640/0x640 [ 870.004130] ? save_stack+0xa9/0xd0 [ 870.007790] ? find_held_lock+0x36/0x1c0 [ 870.011890] ? __lock_is_held+0xb5/0x140 [ 870.016005] ? perf_trace_sched_process_exec+0x860/0x860 [ 870.021506] __should_failslab+0x124/0x180 [ 870.025776] should_failslab+0x9/0x14 [ 870.029598] kmem_cache_alloc_node_trace+0x270/0x740 [ 870.034725] ? kasan_unpoison_shadow+0x35/0x50 [ 870.039345] __kmalloc_node+0x3c/0x70 [ 870.043169] kvmalloc_node+0x65/0xf0 [ 870.046910] xt_replace_table+0x222/0x9e0 [ 870.051097] ? xt_check_match+0x6f0/0x6f0 [ 870.055261] ? __kmalloc_track_caller+0x5eb/0x760 [ 870.060159] xt_register_table+0x328/0x690 [ 870.064430] ? xt_replace_table+0x9e0/0x9e0 [ 870.068778] ? do_add_counters+0x600/0x600 [ 870.073034] ? memset+0x31/0x40 [ 870.076391] ipt_register_table+0x21a/0x3f0 [ 870.080761] ? translate_table+0x1760/0x1760 [ 870.085193] ? rcu_read_lock_sched_held+0x14f/0x180 [ 870.090225] ? __kmalloc+0x5ee/0x760 [ 870.093960] ? __might_fault+0x12b/0x1e0 [ 870.098057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 870.103612] ? ipt_alloc_initial_table+0x560/0x670 [ 870.108566] iptable_raw_table_init+0xb0/0xd0 [ 870.113084] xt_find_table_lock+0x296/0x430 [ 870.117452] xt_request_find_table_lock+0x2b/0xe0 [ 870.122319] get_info+0x17a/0x6f0 [ 870.125800] ? compat_table_info+0x4c0/0x4c0 [ 870.130235] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 870.135542] ? lock_is_held_type+0x210/0x210 [ 870.139971] ? check_preemption_disabled+0x48/0x280 [ 870.145022] ? selinux_capable+0x36/0x40 [ 870.149107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 870.154692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 870.160245] ? ns_capable_common+0x13f/0x170 [ 870.164677] do_ipt_get_ctl+0x176/0xbc0 [ 870.168697] ? alloc_counters.isra.11+0x830/0x830 [ 870.173557] ? __might_fault+0x12b/0x1e0 [ 870.177642] ? lock_downgrade+0x900/0x900 [ 870.181815] ? lock_release+0xa00/0xa00 [ 870.185807] ? perf_trace_sched_process_exec+0x860/0x860 [ 870.191290] ? mutex_unlock+0xd/0x10 [ 870.195022] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 870.200326] nf_getsockopt+0x80/0xe0 [ 870.204063] ip_getsockopt+0x1af/0x240 [ 870.207976] ? do_ip_getsockopt+0x2470/0x2470 [ 870.212556] udp_getsockopt+0x62/0xa0 [ 870.216387] sock_common_getsockopt+0x9a/0xe0 [ 870.220919] __sys_getsockopt+0x1ad/0x390 [ 870.225097] ? kernel_setsockopt+0x1d0/0x1d0 [ 870.229539] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 870.234139] ? trace_hardirqs_on+0xbd/0x310 [ 870.238477] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 870.243862] ? trace_hardirqs_off_caller+0x310/0x310 [ 870.248995] __x64_sys_getsockopt+0xbe/0x150 [ 870.253437] do_syscall_64+0x1b9/0x820 [ 870.257342] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 870.262729] ? syscall_return_slowpath+0x5e0/0x5e0 [ 870.267675] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 870.272543] ? trace_hardirqs_on_caller+0x310/0x310 [ 870.277575] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 870.282615] ? prepare_exit_to_usermode+0x291/0x3b0 [ 870.287667] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 870.292566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 870.297768] RIP: 0033:0x457669 [ 870.300977] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 870.319906] RSP: 002b:00007fec09d27c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 870.327634] RAX: ffffffffffffffda RBX: 00007fec09d27c90 RCX: 0000000000457669 [ 870.334926] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000005 [ 870.342207] RBP: 000000000072bf00 R08: 0000000020000440 R09: 0000000000000000 [ 870.349489] R10: 0000000020000200 R11: 0000000000000246 R12: 00007fec09d286d4 [ 870.356786] R13: 00000000004be32a R14: 00000000004ce388 R15: 0000000000000006 [ 870.369561] audit: type=1326 audit(1545075541.185:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2069 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xffffff80]}}}]}, 0x30}}, 0x0) 19:39:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x0) r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000000)="00de67fb79f444", 0x7, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0xffffffffffff2525, 0xfffffffffffffff9, 0x6, 0xa63e, 0x0, 0x1, 0x100, 0xb, 0x4ec82260, 0x7, 0x5, 0xffffffff80000000, 0x9, 0x1, 0x4, 0x1, 0x100000000, 0x4, 0x8, 0x7ff, 0xbb, 0x7, 0x10000, 0x5, 0x9, 0x2, 0x81, 0x2, 0x6, 0x7fff, 0x3f, 0x200, 0x4, 0x1, 0x6, 0x10000, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000040), 0xa}, 0x0, 0x6, 0x0, 0x0, 0x401, 0x8, 0xffffffffffffffe6}, r2, 0x0, 0xffffffffffffff9c, 0xb) keyctl$dh_compute(0x17, &(0x7f0000000280)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0x53, 0x0) 19:39:01 executing program 2 (fault-call:5 fault-nth:7): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}]}, 0x70}}, 0x0) 19:39:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x2, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x11]}}}]}, 0x30}}, 0x0) 19:39:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x0) r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000000)="00de67fb79f444", 0x7, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0xffffffffffff2525, 0xfffffffffffffff9, 0x6, 0xa63e, 0x0, 0x1, 0x100, 0xb, 0x4ec82260, 0x7, 0x5, 0xffffffff80000000, 0x9, 0x1, 0x4, 0x1, 0x100000000, 0x4, 0x8, 0x7ff, 0xbb, 0x7, 0x10000, 0x5, 0x9, 0x2, 0x81, 0x2, 0x6, 0x7fff, 0x3f, 0x200, 0x4, 0x1, 0x6, 0x10000, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000040), 0xa}, 0x0, 0x6, 0x0, 0x0, 0x401, 0x8, 0xffffffffffffffe6}, r2, 0x0, 0xffffffffffffff9c, 0xb) keyctl$dh_compute(0x17, &(0x7f0000000280)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0x53, 0x0) 19:39:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x500000000000000]}}}]}, 0x30}}, 0x0) 19:39:01 executing program 0: semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(0x0, 0x3, 0x3, &(0x7f0000000080)=""/205) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r2 = open(&(0x7f0000000500)='./file0\x00', 0x3, 0x100) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x0, 0x0, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x2) r5 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0xfffffffffffffffb, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000640)=0x10010001, 0xffffffffffffff53) r6 = fcntl$dupfd(r3, 0x406, r3) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f0000000300)=0x8, 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r3, r3, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x2, 0xd75c, 0x100}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r4, 0x800000000008982, &(0x7f0000000080)) signalfd4(r5, &(0x7f0000000380)={0x8}, 0x8, 0x80800) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket(0x10, 0x3, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r9, r10, 0x0, 0xe6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) 19:39:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]}}}]}, 0x70}}, 0x0) [ 870.810485] IPVS: ftp: loaded support on port[0] = 21 19:39:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xfcffffff00000000]}}}]}, 0x30}}, 0x0) [ 871.107842] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=2142 comm=syz-executor0 [ 871.352345] FAULT_INJECTION: forcing a failure. [ 871.352345] name failslab, interval 1, probability 0, space 0, times 0 [ 871.364735] CPU: 1 PID: 2127 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #155 [ 871.372027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 871.381385] Call Trace: [ 871.384013] dump_stack+0x244/0x39d [ 871.387668] ? dump_stack_print_info.cold.1+0x20/0x20 [ 871.392884] ? debug_smp_processor_id+0x1c/0x20 [ 871.397571] ? perf_trace_lock+0x14d/0x7a0 [ 871.401827] should_fail.cold.4+0xa/0x17 [ 871.405905] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 871.411024] ? lock_is_held_type+0x210/0x210 [ 871.415496] ? zap_class+0x640/0x640 [ 871.419328] ? xt_replace_table+0x222/0x9e0 [ 871.423669] ? ipt_register_table+0x21a/0x3f0 [ 871.428168] ? __nf_register_net_hook+0x172/0x4f0 [ 871.433033] ? xt_request_find_table_lock+0x2b/0xe0 [ 871.438101] ? get_info+0x17a/0x6f0 [ 871.441723] ? find_held_lock+0x36/0x1c0 [ 871.445795] ? __lock_is_held+0xb5/0x140 [ 871.449857] ? perf_trace_sched_process_exec+0x860/0x860 [ 871.455307] ? __local_bh_enable_ip+0x160/0x260 [ 871.459970] __should_failslab+0x124/0x180 [ 871.464237] should_failslab+0x9/0x14 [ 871.468030] kmem_cache_alloc_node_trace+0x270/0x740 [ 871.473158] ? kasan_check_write+0x14/0x20 [ 871.477389] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 871.482311] ? find_next_bit+0x104/0x130 [ 871.486392] __kmalloc_node+0x3c/0x70 [ 871.490206] kvmalloc_node+0x65/0xf0 [ 871.493914] allocate_hook_entries_size+0x44/0x90 [ 871.498766] nf_hook_entries_grow+0x10e/0x670 [ 871.503252] ? __lock_is_held+0xb5/0x140 [ 871.507309] __nf_register_net_hook+0x1bf/0x4f0 [ 871.511982] ? __nf_unregister_net_hook+0x6a0/0x6a0 [ 871.516989] ? xt_replace_table+0x9e0/0x9e0 [ 871.521303] nf_register_net_hook+0x62/0x100 [ 871.525705] nf_register_net_hooks+0x68/0xe0 [ 871.530128] ipt_register_table+0x2fe/0x3f0 [ 871.534449] ? translate_table+0x1760/0x1760 [ 871.538850] ? rcu_read_lock_sched_held+0x14f/0x180 [ 871.543859] ? __kmalloc+0x5ee/0x760 [ 871.547563] ? __might_fault+0x12b/0x1e0 [ 871.551622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 871.557162] ? ipt_alloc_initial_table+0x560/0x670 [ 871.562105] iptable_raw_table_init+0xb0/0xd0 [ 871.566604] xt_find_table_lock+0x296/0x430 [ 871.570923] xt_request_find_table_lock+0x2b/0xe0 [ 871.575757] get_info+0x17a/0x6f0 [ 871.579207] ? compat_table_info+0x4c0/0x4c0 [ 871.583607] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 871.588889] ? lock_is_held_type+0x210/0x210 [ 871.593286] ? check_preemption_disabled+0x48/0x280 [ 871.598299] ? selinux_capable+0x36/0x40 [ 871.602351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 871.607899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 871.613432] ? ns_capable_common+0x13f/0x170 [ 871.617833] do_ipt_get_ctl+0x176/0xbc0 [ 871.621800] ? alloc_counters.isra.11+0x830/0x830 [ 871.626635] ? __might_fault+0x12b/0x1e0 [ 871.630689] ? lock_downgrade+0x900/0x900 [ 871.634832] ? lock_release+0xa00/0xa00 [ 871.638803] ? perf_trace_sched_process_exec+0x860/0x860 [ 871.644256] ? mutex_unlock+0xd/0x10 [ 871.647961] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 871.653229] nf_getsockopt+0x80/0xe0 [ 871.656934] ip_getsockopt+0x1af/0x240 [ 871.660815] ? do_ip_getsockopt+0x2470/0x2470 [ 871.665305] udp_getsockopt+0x62/0xa0 [ 871.669101] sock_common_getsockopt+0x9a/0xe0 [ 871.673608] __sys_getsockopt+0x1ad/0x390 [ 871.677751] ? kernel_setsockopt+0x1d0/0x1d0 [ 871.682167] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 871.686766] ? trace_hardirqs_on+0xbd/0x310 [ 871.691077] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 871.696453] ? trace_hardirqs_off_caller+0x310/0x310 [ 871.701561] __x64_sys_getsockopt+0xbe/0x150 [ 871.705963] do_syscall_64+0x1b9/0x820 [ 871.709836] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 871.715195] ? syscall_return_slowpath+0x5e0/0x5e0 [ 871.720121] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 871.724968] ? trace_hardirqs_on_caller+0x310/0x310 [ 871.729974] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 871.734981] ? prepare_exit_to_usermode+0x291/0x3b0 [ 871.739990] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 871.744828] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 871.750006] RIP: 0033:0x457669 [ 871.753203] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 871.772099] RSP: 002b:00007fec09d27c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 871.779808] RAX: ffffffffffffffda RBX: 00007fec09d27c90 RCX: 0000000000457669 [ 871.787064] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000005 [ 871.794318] RBP: 000000000072bf00 R08: 0000000020000440 R09: 0000000000000000 [ 871.801585] R10: 0000000020000200 R11: 0000000000000246 R12: 00007fec09d286d4 [ 871.808852] R13: 00000000004be32a R14: 00000000004ce388 R15: 0000000000000006 [ 871.818556] kauditd_printk_skb: 3 callbacks suppressed [ 871.818587] audit: type=1326 audit(1545075542.635:696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2113 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 871.828003] audit: type=1326 audit(1545075542.635:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2118 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}]}, 0x70}}, 0x0) 19:39:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x2000000]}}}]}, 0x30}}, 0x0) 19:39:02 executing program 2 (fault-call:5 fault-nth:8): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x20000000000000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:02 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x181000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505331, &(0x7f0000000080)={{0x0, 0x100000001}, {0x80}}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x400, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000240)=0x80, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000100)={{0x4, 0x1}, 'port0\x00', 0x60, 0x10000, 0x9, 0x101, 0xff, 0x3, 0x40, 0x0, 0x0, 0x1}) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000001c0)=0x20db71a9, 0x4) [ 872.037948] audit: type=1326 audit(1545075542.855:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2157 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}}}]}, 0x30}}, 0x0) [ 872.122856] audit: type=1326 audit(1545075542.935:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2162 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:03 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/policy\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f00000005c0)={0x32, @empty, 0x4e22, 0x1, 'wrr\x00', 0x0, 0x1a7, 0x48}, 0x2c) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x140) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000140)={0xfff, 0x1, 0x9, 0x8, 0x4}, 0xc) setsockopt$inet_buf(r2, 0x0, 0x2f, &(0x7f0000000080)="0304a6e94bf35fb870c6f7ef62522dfaa63876d010b68010957d4e6c4fceb6c4d564d57ff0d18f30b6eb3426db99ce6183cd017b05a8e8fa338ca65b83cb22597b28fe4a190eb51c6c7243ef85d727ce12272975ff03bc5e2521f780c9e61c2f6c5a0731768271493cab0cad4446875938a00e0e64dd1efe76b9f0a3e43cf7cd8e1fff2e221bdb57ba604149efaa8c7a1553d41983d26bd0b177af86a96739c15299dcfe240a6f601d0281d9127125d4fed82d003264a4c3d48965da65", 0xbd) ioctl$sock_ifreq(r0, 0x8100000008b0f, &(0x7f0000000040)={'veth0\x00', @ifru_mtu=0x6a}) 19:39:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}}]}, 0x70}}, 0x0) [ 872.210586] IPVS: ftp: loaded support on port[0] = 21 19:39:03 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xa000000]}}}]}, 0x30}}, 0x0) 19:39:03 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xf0]}}}]}, 0x30}}, 0x0) 19:39:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff]}}}]}, 0x70}}, 0x0) [ 872.666996] FAULT_INJECTION: forcing a failure. [ 872.666996] name failslab, interval 1, probability 0, space 0, times 0 [ 872.679082] CPU: 0 PID: 2170 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #155 [ 872.686374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.695747] Call Trace: [ 872.698346] dump_stack+0x244/0x39d [ 872.701974] ? dump_stack_print_info.cold.1+0x20/0x20 [ 872.707178] ? perf_trace_lock+0x4a7/0x7a0 [ 872.711476] should_fail.cold.4+0xa/0x17 [ 872.715554] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 872.720709] ? zap_class+0x640/0x640 [ 872.724444] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 872.729541] ? __nf_register_net_hook+0x172/0x4f0 [ 872.734387] ? find_held_lock+0x36/0x1c0 [ 872.738479] ? __lock_is_held+0xb5/0x140 [ 872.742559] ? perf_trace_sched_process_exec+0x860/0x860 [ 872.748005] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 872.753301] ? call_rcu+0xb/0x10 [ 872.756689] __should_failslab+0x124/0x180 [ 872.760926] should_failslab+0x9/0x14 [ 872.764741] kmem_cache_alloc_node_trace+0x270/0x740 [ 872.769887] ? rcu_is_watching+0x30/0x30 [ 872.773970] __kmalloc_node+0x3c/0x70 [ 872.777785] kvmalloc_node+0x65/0xf0 [ 872.781515] allocate_hook_entries_size+0x44/0x90 [ 872.786358] nf_hook_entries_grow+0x10e/0x670 [ 872.790854] ? __lock_is_held+0xb5/0x140 [ 872.794922] __nf_register_net_hook+0x1bf/0x4f0 [ 872.799592] ? __nf_unregister_net_hook+0x6a0/0x6a0 [ 872.804611] ? xt_replace_table+0x9e0/0x9e0 [ 872.808942] nf_register_net_hook+0x62/0x100 [ 872.813360] nf_register_net_hooks+0x68/0xe0 [ 872.817789] ipt_register_table+0x2fe/0x3f0 [ 872.822128] ? translate_table+0x1760/0x1760 [ 872.826537] ? rcu_read_lock_sched_held+0x14f/0x180 [ 872.831565] ? __kmalloc+0x5ee/0x760 [ 872.835295] ? __might_fault+0x12b/0x1e0 [ 872.839386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 872.844956] ? ipt_alloc_initial_table+0x560/0x670 [ 872.849930] iptable_raw_table_init+0xb0/0xd0 [ 872.854468] xt_find_table_lock+0x296/0x430 [ 872.858822] xt_request_find_table_lock+0x2b/0xe0 [ 872.863719] get_info+0x17a/0x6f0 [ 872.867196] ? compat_table_info+0x4c0/0x4c0 [ 872.871629] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 872.876934] ? lock_is_held_type+0x210/0x210 [ 872.881362] ? check_preemption_disabled+0x48/0x280 [ 872.886422] ? selinux_capable+0x36/0x40 [ 872.890508] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 872.896073] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 872.901625] ? ns_capable_common+0x13f/0x170 [ 872.906061] do_ipt_get_ctl+0x176/0xbc0 [ 872.910073] ? alloc_counters.isra.11+0x830/0x830 [ 872.914936] ? __might_fault+0x12b/0x1e0 [ 872.919020] ? lock_downgrade+0x900/0x900 [ 872.923197] ? lock_release+0xa00/0xa00 [ 872.927191] ? perf_trace_sched_process_exec+0x860/0x860 [ 872.932704] ? mutex_unlock+0xd/0x10 [ 872.936448] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 872.941755] nf_getsockopt+0x80/0xe0 [ 872.945495] ip_getsockopt+0x1af/0x240 [ 872.949406] ? do_ip_getsockopt+0x2470/0x2470 [ 872.953991] udp_getsockopt+0x62/0xa0 [ 872.957822] sock_common_getsockopt+0x9a/0xe0 [ 872.962343] __sys_getsockopt+0x1ad/0x390 [ 872.966517] ? kernel_setsockopt+0x1d0/0x1d0 [ 872.970961] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 872.975565] ? trace_hardirqs_on+0xbd/0x310 [ 872.979903] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 872.985315] ? trace_hardirqs_off_caller+0x310/0x310 [ 872.990453] __x64_sys_getsockopt+0xbe/0x150 [ 872.994897] do_syscall_64+0x1b9/0x820 [ 872.998799] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 873.004184] ? syscall_return_slowpath+0x5e0/0x5e0 [ 873.009129] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 873.014005] ? trace_hardirqs_on_caller+0x310/0x310 [ 873.019043] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 873.024083] ? prepare_exit_to_usermode+0x291/0x3b0 [ 873.029138] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 873.034014] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 873.039221] RIP: 0033:0x457669 [ 873.042436] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 873.061352] RSP: 002b:00007fec09d27c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 873.069075] RAX: ffffffffffffffda RBX: 00007fec09d27c90 RCX: 0000000000457669 [ 873.076356] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000005 [ 873.083636] RBP: 000000000072bf00 R08: 0000000020000440 R09: 0000000000000000 [ 873.090917] R10: 0000000020000200 R11: 0000000000000246 R12: 00007fec09d286d4 [ 873.098220] R13: 00000000004be32a R14: 00000000004ce388 R15: 0000000000000006 19:39:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, &(0x7f0000000300)=0x7, 0xfff, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000380)={@multicast2, @dev, 0x1, 0x4, [@remote, @dev, @loopback, @dev={0xac, 0x14, 0x14, 0x1c}]}, 0x20) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000500)) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x80800) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) sendmmsg(r2, &(0x7f0000001080)=[{{&(0x7f0000000080)=@pptp={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x17}}}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000180)="199f1bda136931be174dea4965", 0xd}], 0x1, 0x0, 0x0, 0x4000001}}, {{&(0x7f0000000d00)=@ethernet={0x306, @dev}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000e80)}, 0x6}], 0x2, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f0000001180)) dup3(r2, r1, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000340)={0x0, 0x4}, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000400), 0x117, 0x5}}, 0x20) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f00000001c0)={0x1, 0x101, 0xfff, 0x7fff, [], [], [], 0xfff, 0xff, 0x8, 0x0, "6ef1b3be6bfa63072ac04574958216b2"}) bpf$MAP_CREATE(0x0, &(0x7f000000bfd4)={0x1, 0x1f, 0x2, 0x20000000000001}, 0x2c) 19:39:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x110]}}}]}, 0x30}}, 0x0) [ 873.111843] audit: type=1326 audit(1545075543.935:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2162 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 873.137879] audit: type=1326 audit(1545075543.955:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2157 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:04 executing program 2 (fault-call:5 fault-nth:9): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}]}, 0x70}}, 0x0) 19:39:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0xd6c41c00, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x3f00000000000000]}}}]}, 0x30}}, 0x0) [ 873.281608] audit: type=1326 audit(1545075544.105:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2203 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 873.314970] dccp_close: ABORT with 13 bytes unread 19:39:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(r0, 0x9) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) finit_module(r0, &(0x7f0000000140)='[trusted{\x00', 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) accept$inet6(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x1c) sendmmsg(r1, &(0x7f0000005fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 873.387867] audit: type=1326 audit(1545075544.205:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2208 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xf000]}}}]}, 0x30}}, 0x0) [ 873.461314] IPVS: ftp: loaded support on port[0] = 21 19:39:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}}]}, 0x70}}, 0x0) 19:39:04 executing program 0: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) chroot(&(0x7f0000000000)='./file0\x00') r2 = dup(r1) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r2, &(0x7f0000000900)=""/4096, 0x1000) ioctl(r0, 0x0, &(0x7f0000000140)="f9efc247c65cb4cd059f024c6c185eceb8a9be7f308064f9b1b5bb250763fa9dc983aafa2e6b48a4cbb68b94358c824072459712087cad8fbae619bcf447e46fb5c9e17abf4067a0157271a750d3e4bcd2e37085ae9805b0a715fcdfa3ce3c35a61f44fc374c3319477092d48fb48c295fea72bd06c7203fde24ec779807c01030d7279e7eda0c87bafa4f1ff8312c3701a98d872fe538ff50db3e863b8b690a353627f64e967cbd18d6c0a1a2133d6bb3dda4c1e7d83e6aef129027d485542a2f470789ca5efe8fc6db208ecdb6525772ebe0") ftruncate(r3, 0x80080) sendfile(r1, r3, 0x0, 0x200800100000001) 19:39:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x1200000000000000]}}}]}, 0x30}}, 0x0) [ 874.040479] audit: type=1326 audit(1545075544.865:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2203 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}}]}, 0x70}}, 0x0) 19:39:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x600000000000000]}}}]}, 0x30}}, 0x0) [ 874.178259] audit: type=1326 audit(1545075544.995:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2208 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:05 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:05 executing program 0: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ashmem\x00', 0x4002000, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=""/63) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, 0x0, &(0x7f0000000240)) r0 = socket$alg(0x26, 0x5, 0x0) unshare(0x20000000) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) mknodat(0xffffffffffffffff, 0x0, 0x8000, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) writev(r1, &(0x7f00000006c0), 0x0) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) write$UHID_INPUT2(r2, &(0x7f0000000200)={0xc, 0x1b, "e700cc0ea8589e44d167847bc2fca3ddb174f90606d828601774e1"}, 0x21) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) setpgid(0x0, 0x0) 19:39:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x1000000000000]}}}]}, 0x30}}, 0x0) 19:39:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0xff0f000000000000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}}]}, 0x70}}, 0x0) 19:39:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x10000000]}}}]}, 0x30}}, 0x0) [ 874.449512] IPVS: ftp: loaded support on port[0] = 21 19:39:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}]}, 0x70}}, 0x0) 19:39:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x1000000]}}}]}, 0x30}}, 0x0) 19:39:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xa00]}}}]}, 0x30}}, 0x0) 19:39:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}}]}, 0x70}}, 0x0) 19:39:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xb]}}}]}, 0x30}}, 0x0) 19:39:06 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x2c0, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:06 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x2, 0x2000) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000280)=0x14) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@mcast1, @in=@dev={0xac, 0x14, 0x14, 0x17}, 0x4e24, 0x79, 0x4e22, 0x66, 0xa, 0x80, 0xa0, 0xb7, r1, r2}, {0x81, 0x4, 0x3800000000, 0x3ff, 0x401, 0x9, 0x8, 0xc9f}, {0x89ba, 0x0, 0x100000000, 0x2}, 0x5, 0x6e6bb7, 0x0, 0x1}, {{@in, 0x4d5, 0x32}, 0xa, @in6=@mcast2, 0x0, 0x0, 0x1, 0x9, 0x7, 0x2, 0xffffffffffffffff}}, 0xe8) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) rt_sigaction(0x38, &(0x7f00000000c0)={&(0x7f0000000000)="c46191d0d345968fc800959a000000000226660f383c5cdd36f0450fb0ad00800000214300400f0028c4e17a6fe3c443f9147b99cbc402c9ddbbe1000000", {0x3}, 0x10000000, &(0x7f0000000080)="982e66450f3a0efaa32646be03000000c4c261a88d00000000c481cd583826470ca86766400fc7fd66420fd0ab6b00000047d9e065420f45b8315f5d1e"}, &(0x7f0000000180)={&(0x7f0000000100)="66420f73d2006466440fc5f465c4417b12464f660f3a61700f4f66c3c46145f50ec4a1fa2d3d5900000066470f5b52f0c4e1f9d6443000c4c2019ca30b000000", {}, 0x0, &(0x7f0000000140)="c421f850cd440f0d9500000020660f3834ecc4013568bf00800000656446d3c26465f30f2c380f95d70f29da67dd0142e105"}, 0x8, &(0x7f00000001c0)) setgroups(0x0, 0x0) write$binfmt_elf64(r3, 0x0, 0x7ffffffff000) 19:39:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x6000000]}}}]}, 0x30}}, 0x0) 19:39:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x100000000000000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}}]}, 0x70}}, 0x0) 19:39:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xfcffffff]}}}]}, 0x30}}, 0x0) [ 875.423669] sg_write: process 481 (syz-executor0) changed security contexts after opening file descriptor, this is not allowed. 19:39:06 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000140)) msgsnd(0x0, &(0x7f0000e74f60)={0x2}, 0x8, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000014) [ 875.491908] IPVS: ftp: loaded support on port[0] = 21 19:39:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x1001]}}}]}, 0x30}}, 0x0) 19:39:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}}]}, 0x70}}, 0x0) [ 875.996354] IPVS: ftp: loaded support on port[0] = 21 19:39:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:06 executing program 0: ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000140)={0x1, "211ac9efe079a23f5f0e8b91200e7a60a1319a9dd0abdcadd495bf3cc336bc11", 0x2, 0x800, 0x8, 0x7, 0x0, 0x4, 0x1, 0xeac4}) socketpair$unix(0x1, 0x20000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x6, &(0x7f0000000040)=0x0) io_submit(r4, 0x1, &(0x7f0000000240)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1, r0, 0x0, 0x2d9, 0x5, 0x0, 0xfffffffffffffffd, r3}]) io_getevents(r4, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r4) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x1, 0x200000) 19:39:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x5]}}}]}, 0x30}}, 0x0) 19:39:07 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xba03000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}]}, 0x70}}, 0x0) 19:39:07 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) r2 = fcntl$dupfd(r1, 0x406, r0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x8, 0x4) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r3, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1, &(0x7f0000001680)=""/72, 0x48}}], 0x1, 0x0, &(0x7f0000002240)) r4 = fcntl$getown(r1, 0x9) sched_rr_get_interval(r4, &(0x7f0000000140)) 19:39:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x13000000]}}}]}, 0x30}}, 0x0) 19:39:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x500000000000000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x10010000]}}}]}, 0x30}}, 0x0) 19:39:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]}}}]}, 0x70}}, 0x0) [ 876.637676] IPVS: ftp: loaded support on port[0] = 21 19:39:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x3f00]}}}]}, 0x30}}, 0x0) 19:39:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x1100]}}}]}, 0x30}}, 0x0) [ 876.959021] kauditd_printk_skb: 10 callbacks suppressed [ 876.959038] audit: type=1326 audit(1545075547.775:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2335 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}}]}, 0x70}}, 0x0) 19:39:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x6]}}}]}, 0x30}}, 0x0) [ 877.158609] audit: type=1326 audit(1545075547.975:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2392 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 877.321656] audit: type=1326 audit(1545075548.145:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2342 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 877.357023] IPVS: ftp: loaded support on port[0] = 21 19:39:08 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x4000000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:08 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x1, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x100, &(0x7f0000000080)=0x2) ioctl(r0, 0x1b, &(0x7f00000001c0)="0a08000000aea68571801239e282da0f4e4845cf854bdb5cf73173793786894f57b7e8070c3bdcb36f9d00f4f73ebb6b6c255548c4a39d9e57bc553a2ce4c0e8de25d6aadc86522b147284b4e3f41b3ca6003c5beebbf65d7b902db08042306f0063d7807cef66b0bc0bfd319d20f0682ab7a7ab0846c5aa23410dfa043727fad9149a5280207ba41f06df8d34ece2444e5ba2f1b0a702b7858a22818441da04eb492bfbbca26e71d2dd4b8112e464280f0d4364e517f79402fbe681bd414342bc67efd8538f46d353593348682d00000000000000000000000000") ioprio_get$pid(0x3, 0x0) 19:39:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xf0ffffff00000000]}}}]}, 0x30}}, 0x0) 19:39:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}]}, 0x70}}, 0x0) 19:39:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x1a0ffffffff, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 877.699855] audit: type=1326 audit(1545075548.515:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2405 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xfffff000]}}}]}, 0x30}}, 0x0) 19:39:08 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) getsockopt$nfc_llcp(r0, 0x118, 0x0, 0x0, 0x805000) [ 877.802155] IPVS: ftp: loaded support on port[0] = 21 19:39:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}]}, 0x70}}, 0x0) 19:39:08 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x1) socketpair$unix(0x1, 0x40000000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000040)={0x3, 0x2, 0x2, 0x800, 0x7, 0x10001, 0x4}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x10300}) [ 877.956040] audit: type=1326 audit(1545075548.775:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2392 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x12000000]}}}]}, 0x30}}, 0x0) 19:39:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}}]}, 0x70}}, 0x0) [ 878.190883] audit: type=1326 audit(1545075549.015:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2436 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 878.311990] IPVS: ftp: loaded support on port[0] = 21 [ 878.501539] audit: type=1326 audit(1545075549.325:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2405 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:09 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xa0010000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fcntl$getown(r1, 0x9) sendmsg$rds(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000840), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="580000000000000014010000060000000000000000000000", @ANYPTR=&(0x7f0000000e80)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000dc0055d3698ed638638f0cb65c0000492617ba000000000000000000000000"], 0x58}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vlan0\x00'}) r2 = dup2(r1, r0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000340)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', r3}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @local}}) socketpair(0x11, 0x0, 0x10000, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000000c0)='bond_slave_1\x00') 19:39:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}]}, 0x70}}, 0x0) 19:39:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x1001000000000000]}}}]}, 0x30}}, 0x0) 19:39:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x40000000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xc0045878, 0x0) [ 878.712871] audit: type=1326 audit(1545075549.535:723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2451 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 878.741207] atomic_op 00000000cbd2c436 conn xmit_atomic (null) 19:39:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xb00]}}}]}, 0x30}}, 0x0) [ 878.784796] IPVS: ftp: loaded support on port[0] = 21 19:39:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}}]}, 0x70}}, 0x0) 19:39:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x1200]}}}]}, 0x30}}, 0x0) [ 878.990789] audit: type=1326 audit(1545075549.815:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2436 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x4]}}}]}, 0x30}}, 0x0) 19:39:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}]}, 0x70}}, 0x0) [ 879.252626] audit: type=1326 audit(1545075550.075:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2492 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 879.488142] IPVS: ftp: loaded support on port[0] = 21 19:39:10 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xd8000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0x48) lstat(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(0x0, 0x0) execveat(0xffffffffffffffff, 0x0, &(0x7f0000000640)=[&(0x7f0000000440)='cpuset\x00', 0x0, &(0x7f0000000540)='-[lo\x00', &(0x7f0000000600)='++cpuset.security\x00'], &(0x7f00000008c0), 0x0) fchown(r1, 0x0, 0x0) execve(0x0, 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000340)='./file1\x00', 0x0, 0x100) r3 = socket$inet(0x2, 0xe, 0x3) r4 = socket(0x8, 0xa, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000001e40)=""/43, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x20) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x801, 0x0) write$uinput_user_dev(r5, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r5, 0x5501, &(0x7f00000001c0)={{}, 'syz*\x00', 0x4c}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @broadcast, @loopback}, &(0x7f0000000d00)=0xc) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f0000000a00)) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'ip6gre0\x00', r6}) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000001e80)={0xf14, r7, 0x10, 0x70bd29, 0x25dfdbfd, {}, [{{0x8, 0x1, r6}, {0x298, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xb231}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x8, 0x7f, 0x8, 0x8}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7862}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfff}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8, 0x6, r6}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x3f, 0x6, 0x4}, {0x7f, 0x5, 0x7fffffff, 0x9}, {0x4d63, 0xe46, 0x9, 0x7}, {0x10000, 0x6, 0x98b}, {0x10000, 0x5, 0x1f, 0x3}]}}}]}}, {{0x8, 0x1, r6}, {0x110, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xff}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8001}}, {0x8, 0x6, r6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xff, 0x101, 0x401, 0x400}, {0x5, 0xb65f, 0x40, 0x8000}, {0x2, 0xdbc, 0x7}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x1f8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x87}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x4000, 0x4, 0x1f, 0x8}, {0xffffffffe2aa8fa5, 0xffffffffffffffff, 0x3, 0xbc4}, {0x1ff, 0x100000001, 0x20}, {0x5, 0x3f, 0x5}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1fd0}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r6}, {0x108, 0x2, [{0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x4, 0xcbb0, 0x7, 0x1}, {0x1, 0x6, 0x7, 0x176}, {0x9, 0xffffffffffffff92, 0x46cb, 0x8}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r6}, {0x254, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8000}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x5, 0x3f, 0x10001, 0x7ff}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r6}, {0xf4, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xa8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x43}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r6}, {0x244, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3f}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffff8}}, {0x8, 0x6, r6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfffffffffffffff7, 0x9, 0x5, 0x6}, {0x9, 0x4, 0x0, 0x4a0}, {0x8c2, 0x5, 0x21b}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x10000}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x180, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r6}, {0x104, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}]}, 0xf14}, 0x1, 0x0, 0x0, 0x4000}, 0x800) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000e80)={{0x2, 0x0, 0x0, 0x2000}, 'syz1\x00'}) io_setup(0x1f, &(0x7f0000000dc0)=0x0) io_submit(r9, 0x1, &(0x7f00000011c0)=[&(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x3}]) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000040), 0x4) fsetxattr$security_ima(r4, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000900)=@v2={0x5, 0x0, 0x6, 0x0, 0xd3, "9a1912fd18d03e19ea476d7dd6d2ca151ede13ffbe4b2cc8867b6488ac1640d6de5f6ea48eb9676d6318a39ae9657a214c877de080000cb22c9840b8bb9c456fc3303fcc964be7788ab2b0e1bf1e5e50d31c2510a3136e62c7f4e26f14c8f79d0cb7132bdf9088250fc052bf357707fc154db87bbb32b856ec9a65809ad466127bb3ad3ab27af30655d695b5cb4ea320e1101015b2911c2321b56c55928eea6b56e26f3401891f90b3cd2300b3a61e41613faa00956059863fa957626d1ce476f24f25050aca2602a03f7ae3ef555baf4102c1"}, 0xdd, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000d00, 0x0, 0x0, 0x0, 0x0, 0x109, 0x6000}, 0x28) 19:39:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x900000000000000]}}}]}, 0x30}}, 0x0) 19:39:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}}]}, 0x70}}, 0x0) 19:39:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x1cc4d6, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x1300000000000000]}}}]}, 0x30}}, 0x0) [ 880.078829] input: syz1 as /devices/virtual/input/input29 19:39:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}}]}, 0x70}}, 0x0) 19:39:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 880.134610] IPVS: ftp: loaded support on port[0] = 21 19:39:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xf000000]}}}]}, 0x30}}, 0x0) 19:39:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x9effffff]}}}]}, 0x30}}, 0x0) 19:39:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}]}, 0x70}}, 0x0) 19:39:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x6, 0x4) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000040)) getsockname$inet(r1, &(0x7f0000000280)={0x2, 0x0, @multicast1}, &(0x7f00000002c0)=0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) [ 880.586384] protocol 8847 is buggy, dev sit0 [ 880.618379] protocol 8847 is buggy, dev sit0 [ 880.636523] protocol 8847 is buggy, dev sit0 [ 880.656904] protocol 8847 is buggy, dev sit0 [ 880.670408] protocol 8847 is buggy, dev sit0 [ 880.679134] protocol 8847 is buggy, dev sit0 [ 880.692884] protocol 8847 is buggy, dev sit0 [ 880.708173] protocol 8847 is buggy, dev sit0 [ 880.721035] protocol 8847 is buggy, dev sit0 [ 880.734632] protocol 8847 is buggy, dev sit0 [ 880.847964] IPVS: ftp: loaded support on port[0] = 21 19:39:12 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xf2000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x900]}}}]}, 0x30}}, 0x0) 19:39:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}}]}, 0x70}}, 0x0) 19:39:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x6, 0x4) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000040)) getsockname$inet(r1, &(0x7f0000000280)={0x2, 0x0, @multicast1}, &(0x7f00000002c0)=0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x2000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xfffffff0]}}}]}, 0x30}}, 0x0) 19:39:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}]}, 0x70}}, 0x0) 19:39:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xfffffffc]}}}]}, 0x30}}, 0x0) [ 881.452230] IPVS: ftp: loaded support on port[0] = 21 19:39:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x80ffffff00000000]}}}]}, 0x30}}, 0x0) 19:39:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x6, 0x4) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000040)) getsockname$inet(r1, &(0x7f0000000280)={0x2, 0x0, @multicast1}, &(0x7f00000002c0)=0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}]}, 0x70}}, 0x0) [ 882.037908] IPVS: ftp: loaded support on port[0] = 21 [ 882.059813] kauditd_printk_skb: 8 callbacks suppressed [ 882.059828] audit: type=1326 audit(1545075552.875:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2553 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 882.119965] audit: type=1326 audit(1545075552.915:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2556 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:13 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x40000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xf00000000000000]}}}]}, 0x30}}, 0x0) 19:39:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}]}, 0x70}}, 0x0) 19:39:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x6, 0x4) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000040)) getsockname$inet(r1, &(0x7f0000000280)={0x2, 0x0, @multicast1}, &(0x7f00000002c0)=0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x4200000000000000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 882.496338] audit: type=1326 audit(1545075553.315:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2600 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xffffff7f00000000]}}}]}, 0x30}}, 0x0) [ 882.571818] audit: type=1326 audit(1545075553.305:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2597 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}}]}, 0x70}}, 0x0) [ 882.645837] IPVS: ftp: loaded support on port[0] = 21 19:39:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xf0ffff]}}}]}, 0x30}}, 0x0) 19:39:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x6, 0x4) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x8]}}}]}, 0x30}}, 0x0) 19:39:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}]}, 0x70}}, 0x0) [ 883.271375] audit: type=1326 audit(1545075554.085:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2597 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 883.303011] IPVS: ftp: loaded support on port[0] = 21 [ 883.306226] audit: type=1326 audit(1545075554.115:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2600 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:14 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x12a, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x6, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:14 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xfffffffffffff000]}}}]}, 0x30}}, 0x0) 19:39:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}]}, 0x70}}, 0x0) 19:39:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x10, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 883.689015] audit: type=1326 audit(1545075554.505:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2643 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:14 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x800000000000000]}}}]}, 0x30}}, 0x0) 19:39:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff]}}}]}, 0x70}}, 0x0) [ 883.785491] audit: type=1326 audit(1545075554.545:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2645 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 883.833551] IPVS: ftp: loaded support on port[0] = 21 19:39:14 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x1000000000000000]}}}]}, 0x30}}, 0x0) 19:39:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}}]}, 0x70}}, 0x0) 19:39:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) [ 884.425728] IPVS: ftp: loaded support on port[0] = 21 [ 884.472014] audit: type=1326 audit(1545075555.295:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2643 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 884.521865] audit: type=1326 audit(1545075555.345:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2645 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:15 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x200000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xb000000]}}}]}, 0x30}}, 0x0) 19:39:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}}]}, 0x70}}, 0x0) 19:39:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0xd6c41c0000000000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x300]}}}]}, 0x30}}, 0x0) [ 884.953142] IPVS: ftp: loaded support on port[0] = 21 19:39:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}}]}, 0x70}}, 0x0) 19:39:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xffffff9e]}}}]}, 0x30}}, 0x0) 19:39:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}}]}, 0x70}}, 0x0) [ 885.525574] IPVS: ftp: loaded support on port[0] = 21 19:39:16 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xe802000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]}}}]}, 0x70}}, 0x0) 19:39:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x400000000000000]}}}]}, 0x30}}, 0x0) 19:39:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0xffffffff00000000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x9000000]}}}]}, 0x30}}, 0x0) 19:39:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}}]}, 0x70}}, 0x0) [ 886.178538] IPVS: ftp: loaded support on port[0] = 21 19:39:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x12]}}}]}, 0x30}}, 0x0) 19:39:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}]}, 0x70}}, 0x0) [ 886.748979] IPVS: ftp: loaded support on port[0] = 21 19:39:17 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x8a01000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x3]}}}]}, 0x30}}, 0x0) 19:39:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}}]}, 0x70}}, 0x0) 19:39:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0xa0010000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) [ 887.233112] kauditd_printk_skb: 8 callbacks suppressed [ 887.233128] audit: type=1326 audit(1545075558.055:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2772 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xf0ffffffffffff]}}}]}, 0x30}}, 0x0) [ 887.339508] audit: type=1326 audit(1545075558.115:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2773 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}]}, 0x70}}, 0x0) [ 887.414365] IPVS: ftp: loaded support on port[0] = 21 19:39:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x300000000000000]}}}]}, 0x30}}, 0x0) 19:39:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x1100000000000000]}}}]}, 0x30}}, 0x0) [ 887.952752] IPVS: ftp: loaded support on port[0] = 21 [ 888.015896] audit: type=1326 audit(1545075558.835:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2773 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 888.059980] audit: type=1326 audit(1545075558.835:755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2772 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:19 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x7c030000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}]}, 0x70}}, 0x0) 19:39:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x3f000000]}}}]}, 0x30}}, 0x0) 19:39:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x5, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 888.538501] audit: type=1326 audit(1545075559.355:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2813 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 888.587271] audit: type=1326 audit(1545075559.395:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2814 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x3000000]}}}]}, 0x30}}, 0x0) 19:39:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}]}, 0x70}}, 0x0) [ 888.696230] IPVS: ftp: loaded support on port[0] = 21 19:39:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x4000000]}}}]}, 0x30}}, 0x0) 19:39:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}]}, 0x70}}, 0x0) [ 889.224836] IPVS: ftp: loaded support on port[0] = 21 [ 889.340014] audit: type=1326 audit(1545075560.155:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2813 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 889.386430] audit: type=1326 audit(1545075560.195:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2814 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:20 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xc6030000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:20 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x600]}}}]}, 0x30}}, 0x0) 19:39:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}}]}, 0x70}}, 0x0) 19:39:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0xff0f0000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 889.592931] audit: type=1326 audit(1545075560.415:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2855 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:20 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x13]}}}]}, 0x30}}, 0x0) [ 889.662980] audit: type=1326 audit(1545075560.455:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2853 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 889.727949] IPVS: ftp: loaded support on port[0] = 21 19:39:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}}]}, 0x70}}, 0x0) 19:39:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:20 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x9effffff00000000]}}}]}, 0x30}}, 0x0) 19:39:20 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xb00000000000000]}}}]}, 0x30}}, 0x0) [ 890.227767] IPVS: ftp: loaded support on port[0] = 21 19:39:21 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x5001, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 19:39:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}}]}, 0x70}}, 0x0) 19:39:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xa00000000000000]}}}]}, 0x30}}, 0x0) 19:39:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x42000000, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x11000000]}}}]}, 0x30}}, 0x0) [ 890.670625] IPVS: ftp: loaded support on port[0] = 21 19:39:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}}]}, 0x70}}, 0x0) 19:39:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0xffffff7f]}}}]}, 0x30}}, 0x0) 19:39:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0x0, 0x29, 0x0, &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]}}}]}, 0x70}}, 0x0) [ 891.269438] IPVS: ftp: loaded support on port[0] = 21 19:39:22 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x9403, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0x0, 0x29, &(0x7f0000000000), &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x5000000]}}}]}, 0x30}}, 0x0) 19:39:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}]}, 0x70}}, 0x0) 19:39:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x4000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0x7, 0x29, &(0x7f0000000000)="b90703e69ebf08", &(0x7f0000000140)=""/41, 0x69}, 0x28) [ 891.850280] IPVS: ftp: loaded support on port[0] = 21 19:39:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffff9e]}}}]}, 0x30}}, 0x0) 19:39:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]}}}]}, 0x70}}, 0x0) 19:39:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xb, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfffffffffffff000]}}}]}, 0x30}}, 0x0) 19:39:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}}]}, 0x70}}, 0x0) [ 892.526180] IPVS: ftp: loaded support on port[0] = 21 [ 892.583023] kauditd_printk_skb: 8 callbacks suppressed [ 892.583037] audit: type=1326 audit(1545075563.405:770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2933 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 892.614344] audit: type=1326 audit(1545075563.435:771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2934 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:23 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xd602, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xd, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e1088", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x800000000000000]}}}]}, 0x30}}, 0x0) 19:39:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}]}, 0x70}}, 0x0) 19:39:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x2000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 892.995674] audit: type=1326 audit(1545075563.815:772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2975 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4000000]}}}]}, 0x30}}, 0x0) 19:39:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 893.068617] audit: type=1326 audit(1545075563.845:773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2978 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}]}, 0x70}}, 0x0) [ 893.137586] IPVS: ftp: loaded support on port[0] = 21 19:39:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0}, 0x28) 19:39:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x9effffff]}}}]}, 0x30}}, 0x0) 19:39:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) [ 893.492904] net_ratelimit: 935 callbacks suppressed [ 893.492988] protocol 8847 is buggy, dev sit0 [ 893.518248] protocol 8847 is buggy, dev sit0 [ 893.531864] protocol 8847 is buggy, dev sit0 [ 893.544159] protocol 8847 is buggy, dev sit0 [ 893.556225] protocol 8847 is buggy, dev sit0 [ 893.567397] protocol 8847 is buggy, dev sit0 [ 893.582031] protocol 8847 is buggy, dev sit0 [ 893.593051] protocol 8847 is buggy, dev sit0 [ 893.604038] protocol 8847 is buggy, dev sit0 [ 893.614930] protocol 8847 is buggy, dev sit0 [ 893.713394] IPVS: ftp: loaded support on port[0] = 21 [ 893.795471] audit: type=1326 audit(1545075564.615:774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2975 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 893.856632] audit: type=1326 audit(1545075564.645:775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2978 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:25 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x13c, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]}}}]}, 0x70}}, 0x0) 19:39:25 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfffffff0]}}}]}, 0x30}}, 0x0) 19:39:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x4200000000000000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x6, 0x4) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 894.282802] audit: type=1326 audit(1545075565.105:777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3020 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 894.326650] IPVS: ftp: loaded support on port[0] = 21 19:39:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}}]}, 0x70}}, 0x0) 19:39:25 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfcffffff00000000]}}}]}, 0x30}}, 0x0) [ 894.403652] audit: type=1326 audit(1545075565.095:776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3025 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x6, 0x4) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:25 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x5000000]}}}]}, 0x30}}, 0x0) 19:39:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff]}}}]}, 0x70}}, 0x0) 19:39:25 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf0]}}}]}, 0x30}}, 0x0) [ 895.072315] audit: type=1326 audit(1545075565.895:778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3020 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 895.122044] IPVS: ftp: loaded support on port[0] = 21 [ 895.135013] audit: type=1326 audit(1545075565.915:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3025 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xd800000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x6, 0x4) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}}]}, 0x70}}, 0x0) 19:39:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x600]}}}]}, 0x30}}, 0x0) 19:39:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x200000000000000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 895.593093] IPVS: ftp: loaded support on port[0] = 21 19:39:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3f00]}}}]}, 0x30}}, 0x0) 19:39:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}}]}, 0x70}}, 0x0) 19:39:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x6, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xa00]}}}]}, 0x30}}, 0x0) 19:39:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}]}, 0x70}}, 0x0) 19:39:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4]}}}]}, 0x30}}, 0x0) [ 896.188888] IPVS: ftp: loaded support on port[0] = 21 19:39:27 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xa400000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8]}}}]}, 0x30}}, 0x0) 19:39:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}]}, 0x70}}, 0x0) 19:39:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x1a0ffffffff, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x9]}}}]}, 0x30}}, 0x0) [ 896.761959] IPVS: ftp: loaded support on port[0] = 21 19:39:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}]}, 0x70}}, 0x0) 19:39:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xb]}}}]}, 0x30}}, 0x0) 19:39:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3f00000000000000]}}}]}, 0x30}}, 0x0) 19:39:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}}]}, 0x70}}, 0x0) [ 897.450092] IPVS: ftp: loaded support on port[0] = 21 19:39:28 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xea03000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:28 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x13000000]}}}]}, 0x30}}, 0x0) 19:39:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}]}, 0x70}}, 0x0) 19:39:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x200000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:28 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6000000]}}}]}, 0x30}}, 0x0) [ 897.989355] kauditd_printk_skb: 8 callbacks suppressed [ 897.989372] audit: type=1326 audit(1545075568.805:788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3181 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) [ 898.087236] audit: type=1326 audit(1545075568.845:789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3183 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:28 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x10010000]}}}]}, 0x30}}, 0x0) 19:39:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}}]}, 0x70}}, 0x0) [ 898.173965] IPVS: ftp: loaded support on port[0] = 21 19:39:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x80ffffff]}}}]}, 0x30}}, 0x0) [ 898.663382] IPVS: ftp: loaded support on port[0] = 21 [ 898.781653] audit: type=1326 audit(1545075569.605:790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3183 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 898.840793] audit: type=1326 audit(1545075569.665:791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3181 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:29 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x7401000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x10000000000000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffff7f00000000]}}}]}, 0x30}}, 0x0) 19:39:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}]}, 0x70}}, 0x0) [ 899.159962] audit: type=1326 audit(1545075569.975:792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3230 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) [ 899.236581] audit: type=1326 audit(1545075570.035:793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3232 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:30 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x400000000000000]}}}]}, 0x30}}, 0x0) 19:39:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}]}, 0x70}}, 0x0) [ 899.327292] IPVS: ftp: loaded support on port[0] = 21 19:39:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:30 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x200000000000000]}}}]}, 0x30}}, 0x0) 19:39:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}}]}, 0x70}}, 0x0) [ 899.904799] IPVS: ftp: loaded support on port[0] = 21 [ 899.955322] audit: type=1326 audit(1545075570.775:794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3230 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 900.001186] audit: type=1326 audit(1545075570.805:795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3232 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:31 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x900000000000000]}}}]}, 0x30}}, 0x0) 19:39:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}}]}, 0x70}}, 0x0) 19:39:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x500000000000000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:31 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x74010000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 900.511106] audit: type=1326 audit(1545075571.335:796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3285 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:31 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf0ffffffffffff]}}}]}, 0x30}}, 0x0) [ 900.589654] audit: type=1326 audit(1545075571.405:797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3284 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 900.640379] IPVS: ftp: loaded support on port[0] = 21 19:39:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}}]}, 0x70}}, 0x0) 19:39:31 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x300000000000000]}}}]}, 0x30}}, 0x0) 19:39:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}}]}, 0x70}}, 0x0) 19:39:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:31 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf0ffff]}}}]}, 0x30}}, 0x0) 19:39:31 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x12000000]}}}]}, 0x30}}, 0x0) [ 901.327210] IPVS: ftp: loaded support on port[0] = 21 19:39:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0xd6c41c00, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:32 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xe6030000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}]}, 0x70}}, 0x0) 19:39:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf000000]}}}]}, 0x30}}, 0x0) 19:39:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf000]}}}]}, 0x30}}, 0x0) [ 901.872832] IPVS: ftp: loaded support on port[0] = 21 19:39:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}}]}, 0x70}}, 0x0) 19:39:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf00]}}}]}, 0x30}}, 0x0) 19:39:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xa00000000000000]}}}]}, 0x30}}, 0x0) 19:39:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x3f00, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 902.424871] IPVS: ftp: loaded support on port[0] = 21 19:39:33 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x98010000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}}]}, 0x70}}, 0x0) 19:39:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x100000000000000]}}}]}, 0x30}}, 0x0) 19:39:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 19:39:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfffff000]}}}]}, 0x30}}, 0x0) 19:39:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}]}, 0x70}}, 0x0) [ 902.912002] IPVS: ftp: loaded support on port[0] = 21 19:39:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xa000000]}}}]}, 0x30}}, 0x0) 19:39:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8000000]}}}]}, 0x30}}, 0x0) [ 903.209050] kauditd_printk_skb: 8 callbacks suppressed [ 903.209066] audit: type=1326 audit(1545075574.025:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3371 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0xff0f, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 903.357194] audit: type=1326 audit(1545075574.175:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3410 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 903.406125] IPVS: ftp: loaded support on port[0] = 21 [ 903.623550] audit: type=1326 audit(1545075574.445:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3384 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:34 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x54030000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}}]}, 0x70}}, 0x0) 19:39:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0x0, 0x29, 0x0, &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:34 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x5]}}}]}, 0x30}}, 0x0) 19:39:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0x0, 0x29, &(0x7f0000000000), &(0x7f0000000140)=""/41, 0x69}, 0x28) [ 903.851081] audit: type=1326 audit(1545075574.675:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3421 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0x7, 0x29, &(0x7f0000000000)="b90703e69ebf08", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:34 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x12]}}}]}, 0x30}}, 0x0) [ 903.965301] IPVS: ftp: loaded support on port[0] = 21 19:39:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff]}}}]}, 0x70}}, 0x0) 19:39:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xb, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:35 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x110]}}}]}, 0x30}}, 0x0) [ 904.157560] audit: type=1326 audit(1545075574.975:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3410 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x3f00000000000000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 904.382164] audit: type=1326 audit(1545075575.205:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3449 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 904.607407] IPVS: ftp: loaded support on port[0] = 21 [ 904.650872] audit: type=1326 audit(1545075575.475:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3421 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:35 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xe02, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}]}, 0x70}}, 0x0) 19:39:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xd, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e1088", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:35 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1200000000000000]}}}]}, 0x30}}, 0x0) 19:39:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 905.170793] audit: type=1326 audit(1545075575.995:813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3460 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1000000000000000]}}}]}, 0x30}}, 0x0) 19:39:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 905.254637] audit: type=1326 audit(1545075576.035:814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3449 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x20000000000000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}]}, 0x70}}, 0x0) [ 905.333115] IPVS: ftp: loaded support on port[0] = 21 19:39:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0}, 0x28) 19:39:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x10]}}}]}, 0x30}}, 0x0) [ 905.432114] audit: type=1326 audit(1545075576.255:815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3478 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) [ 905.699347] net_ratelimit: 830 callbacks suppressed [ 905.699448] protocol 8847 is buggy, dev sit0 [ 905.721105] protocol 8847 is buggy, dev sit0 [ 905.727283] protocol 8847 is buggy, dev sit0 [ 905.741730] protocol 8847 is buggy, dev sit0 [ 905.755415] protocol 8847 is buggy, dev sit0 [ 905.766517] protocol 8847 is buggy, dev sit0 [ 905.778739] protocol 8847 is buggy, dev sit0 [ 905.792308] protocol 8847 is buggy, dev sit0 [ 905.800445] protocol 8847 is buggy, dev sit0 [ 905.805594] protocol 8847 is buggy, dev sit0 [ 905.934522] IPVS: ftp: loaded support on port[0] = 21 19:39:37 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x20e, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf00000000000000]}}}]}, 0x30}}, 0x0) 19:39:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}}]}, 0x70}}, 0x0) 19:39:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x6, 0x4) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000040)) getsockname$inet(r1, &(0x7f0000000280)={0x2, 0x0, @multicast1}, &(0x7f00000002c0)=0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", &(0x7f0000000140)=""/41, 0x69}, 0x28) 19:39:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0xff0f0000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xb00000000000000]}}}]}, 0x30}}, 0x0) [ 906.631113] IPVS: ftp: loaded support on port[0] = 21 19:39:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}}]}, 0x70}}, 0x0) 19:39:37 executing program 0 (fault-call:1 fault-nth:0): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xb000000]}}}]}, 0x30}}, 0x0) 19:39:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1200]}}}]}, 0x30}}, 0x0) [ 907.153682] IPVS: ftp: loaded support on port[0] = 21 19:39:38 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xf401000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}]}, 0x70}}, 0x0) 19:39:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xa]}}}]}, 0x30}}, 0x0) 19:39:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x5000000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3000000]}}}]}, 0x30}}, 0x0) [ 907.710981] IPVS: ftp: loaded support on port[0] = 21 19:39:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}}]}, 0x70}}, 0x0) 19:39:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6]}}}]}, 0x30}}, 0x0) 19:39:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 908.097346] IPVS: ftp: loaded support on port[0] = 21 [ 908.403822] kauditd_printk_skb: 8 callbacks suppressed [ 908.403847] audit: type=1326 audit(1545075579.225:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3552 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:39 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xfc030000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x500000000000000]}}}]}, 0x30}}, 0x0) 19:39:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}}]}, 0x70}}, 0x0) 19:39:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 908.435380] audit: type=1326 audit(1545075579.225:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3553 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x4200, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}]}, 0x70}}, 0x0) 19:39:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x10000000]}}}]}, 0x30}}, 0x0) [ 908.616631] IPVS: ftp: loaded support on port[0] = 21 [ 908.631919] audit: type=1326 audit(1545075579.445:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3600 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf0ffffff]}}}]}, 0x30}}, 0x0) [ 908.736340] audit: type=1326 audit(1545075579.535:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3603 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 909.098502] IPVS: ftp: loaded support on port[0] = 21 19:39:40 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xd0030000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}]}, 0x70}}, 0x0) 19:39:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffff80]}}}]}, 0x30}}, 0x0) 19:39:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 909.428732] audit: type=1326 audit(1545075580.245:828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3600 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 909.511542] audit: type=1326 audit(1545075580.335:829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3603 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 909.536135] IPVS: ftp: loaded support on port[0] = 21 19:39:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0xd6c41c0000000000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1000000000000]}}}]}, 0x30}}, 0x0) 19:39:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}}]}, 0x70}}, 0x0) [ 909.629568] audit: type=1326 audit(1545075580.445:830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3641 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x900]}}}]}, 0x30}}, 0x0) 19:39:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}]}, 0x70}}, 0x0) [ 909.736718] audit: type=1326 audit(1545075580.545:831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3650 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 910.203358] IPVS: ftp: loaded support on port[0] = 21 [ 910.430447] audit: type=1326 audit(1545075581.245:832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3641 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 910.509846] audit: type=1326 audit(1545075581.325:833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3650 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:41 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x7401, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1100]}}}]}, 0x30}}, 0x0) 19:39:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}]}, 0x70}}, 0x0) 19:39:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x40000000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x13]}}}]}, 0x30}}, 0x0) [ 910.789114] IPVS: ftp: loaded support on port[0] = 21 19:39:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}}]}, 0x70}}, 0x0) 19:39:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x11]}}}]}, 0x30}}, 0x0) 19:39:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfffffffc]}}}]}, 0x30}}, 0x0) [ 911.374336] IPVS: ftp: loaded support on port[0] = 21 19:39:42 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x3f4, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}]}, 0x70}}, 0x0) 19:39:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3f000000]}}}]}, 0x30}}, 0x0) 19:39:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x10, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffff7f]}}}]}, 0x30}}, 0x0) [ 911.966553] IPVS: ftp: loaded support on port[0] = 21 19:39:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}}]}, 0x70}}, 0x0) 19:39:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfcffffff]}}}]}, 0x30}}, 0x0) 19:39:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 912.546581] IPVS: ftp: loaded support on port[0] = 21 19:39:43 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xe8030000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]}}}]}, 0x70}}, 0x0) 19:39:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x500]}}}]}, 0x30}}, 0x0) 19:39:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0xff0f000000000000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf]}}}]}, 0x30}}, 0x0) 19:39:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000005, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 913.138408] IPVS: ftp: loaded support on port[0] = 21 19:39:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}}]}, 0x70}}, 0x0) 19:39:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x2]}}}]}, 0x30}}, 0x0) 19:39:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000c, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x600000000000000]}}}]}, 0x30}}, 0x0) [ 913.637341] IPVS: ftp: loaded support on port[0] = 21 [ 913.841279] kauditd_printk_skb: 10 callbacks suppressed [ 913.841294] audit: type=1326 audit(1545075584.665:844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3757 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 913.875799] audit: type=1326 audit(1545075584.695:845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3760 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:44 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x16030000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}}]}, 0x70}}, 0x0) 19:39:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000d, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x11000000]}}}]}, 0x30}}, 0x0) 19:39:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0xa0010000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 914.061120] audit: type=1326 audit(1545075584.865:846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3799 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 914.106906] IPVS: ftp: loaded support on port[0] = 21 19:39:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf0ffffff00000000]}}}]}, 0x30}}, 0x0) 19:39:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000013, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 914.143616] audit: type=1326 audit(1545075584.925:847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3801 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}}]}, 0x70}}, 0x0) 19:39:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000010, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x300]}}}]}, 0x30}}, 0x0) 19:39:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000014, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 914.601161] IPVS: ftp: loaded support on port[0] = 21 [ 914.844771] audit: type=1326 audit(1545075585.665:848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3799 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 914.872485] audit: type=1326 audit(1545075585.695:849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3801 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:45 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xf6030000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3]}}}]}, 0x30}}, 0x0) 19:39:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}}]}, 0x70}}, 0x0) 19:39:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x100000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000007, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 915.043416] audit: type=1326 audit(1545075585.865:850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3838 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 915.083924] audit: type=1326 audit(1545075585.895:851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3842 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x80ffffff00000000]}}}]}, 0x30}}, 0x0) [ 915.129023] IPVS: ftp: loaded support on port[0] = 21 19:39:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000011, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]}}}]}, 0x70}}, 0x0) 19:39:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000012, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x9effffff00000000]}}}]}, 0x30}}, 0x0) 19:39:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000015, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 915.592282] IPVS: ftp: loaded support on port[0] = 21 [ 915.839859] audit: type=1326 audit(1545075586.655:852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3838 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 915.866533] audit: type=1326 audit(1545075586.685:853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3842 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:46 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x8, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}]}, 0x70}}, 0x0) 19:39:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1300000000000000]}}}]}, 0x30}}, 0x0) 19:39:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x2, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000002, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1300]}}}]}, 0x30}}, 0x0) 19:39:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000004, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 916.049618] IPVS: ftp: loaded support on port[0] = 21 19:39:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}}]}, 0x70}}, 0x0) 19:39:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1001]}}}]}, 0x30}}, 0x0) 19:39:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000008, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1100000000000000]}}}]}, 0x30}}, 0x0) [ 916.616572] IPVS: ftp: loaded support on port[0] = 21 19:39:47 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xb4020000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000009, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}]}, 0x70}}, 0x0) 19:39:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:47 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1001000000000000]}}}]}, 0x30}}, 0x0) 19:39:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x1000000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000e, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x9000000]}}}]}, 0x30}}, 0x0) [ 917.262910] IPVS: ftp: loaded support on port[0] = 21 19:39:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}}]}, 0x70}}, 0x0) 19:39:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000003, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:48 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x2000000]}}}]}, 0x30}}, 0x0) 19:39:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000b, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 917.822268] IPVS: ftp: loaded support on port[0] = 21 19:39:49 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x6e00, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1000000]}}}]}, 0x30}}, 0x0) 19:39:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000f, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}}]}, 0x70}}, 0x0) 19:39:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x500, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0xb00]}}}]}, 0x30}}, 0x0) [ 918.370743] IPVS: ftp: loaded support on port[0] = 21 19:39:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}]}, 0x70}}, 0x0) 19:39:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x100000000000000, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x300000000000000]}}}]}, 0x30}}, 0x0) 19:39:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x1000000, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 918.963236] IPVS: ftp: loaded support on port[0] = 21 [ 919.133806] kauditd_printk_skb: 10 callbacks suppressed [ 919.133823] audit: type=1326 audit(1545075589.955:864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3959 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 919.193573] audit: type=1326 audit(1545075589.985:865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3960 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:50 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xd6000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}]}, 0x70}}, 0x0) 19:39:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69, 0x1000000}, 0x28) 19:39:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}}}]}, 0x30}}, 0x0) 19:39:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x5, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 919.566813] audit: type=1326 audit(1545075590.385:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3998 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69, 0x100000000000000}, 0x28) 19:39:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}}]}, 0x30}}, 0x0) [ 919.651177] IPVS: ftp: loaded support on port[0] = 21 [ 919.660484] audit: type=1326 audit(1545075590.475:867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3999 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}]}, 0x70}}, 0x0) 19:39:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x200000e8) 19:39:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x300]}}}]}, 0x30}}, 0x0) 19:39:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x48) [ 920.176590] IPVS: ftp: loaded support on port[0] = 21 [ 920.347227] audit: type=1326 audit(1545075591.165:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3998 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 920.391525] audit: type=1326 audit(1545075591.195:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3999 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xd003000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}]}, 0x70}}, 0x0) 19:39:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x900]}}}]}, 0x30}}, 0x0) 19:39:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="cf02000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b705b6538972f3800b391d6c060000f60a9ca4cde067a0ee00854896aa269bffffffff2de405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00"], 0x0}, 0x48) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000240)=@fragment, 0x8) getsockopt$inet6_opts(r1, 0x29, 0x500000000037, 0x0, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x1, 0x8f72dae48c6642f2, 0x2, 0x4, 0x1ff, 0x9}, 0x20) 19:39:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x3f000000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 920.598535] audit: type=1326 audit(1545075591.415:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4038 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x1300]}}}]}, 0x30}}, 0x0) 19:39:51 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x400000, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x800040) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x7, 0x3, [0xffffffff, 0x7, 0x3]}, &(0x7f0000000140)=0xe) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={r1, 0x40}, 0x8) [ 920.657051] audit: type=1326 audit(1545075591.455:871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4037 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 920.717283] IPVS: ftp: loaded support on port[0] = 21 19:39:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}]}, 0x70}}, 0x0) 19:39:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000280)={0x0, 0x5}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000040)={r1, 0x7ff, 0x6, [0x0, 0x8, 0x9, 0x7ff, 0x0, 0x9]}, &(0x7f0000000080)=0x14) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e24, 0x200, @local, 0xffffffffffffff24}}}, 0xfffffffffffffdb5) 19:39:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x11]}}}]}, 0x30}}, 0x0) 19:39:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}}]}, 0x70}}, 0x0) [ 921.214866] IPVS: ftp: loaded support on port[0] = 21 [ 921.398987] audit: type=1326 audit(1545075592.215:872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4038 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 921.446911] audit: type=1326 audit(1545075592.255:873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4037 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:52 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x2a02000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xb000000]}}}]}, 0x30}}, 0x0) 19:39:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x40000000}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}}]}, 0x70}}, 0x0) 19:39:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x4000000000000000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa3000098e0dd00f0fff80400000000000000000000b70e0000ffffffff2d6405000000000065757c28ecec8c9d759a040400010000000404000001007d60b7030000000000006a0a00fe00000000850000009500e9ff00000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x10]}}}]}, 0x30}}, 0x0) 19:39:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff]}}}]}, 0x70}}, 0x0) [ 921.728277] IPVS: ftp: loaded support on port[0] = 21 19:39:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xa]}}}]}, 0x30}}, 0x0) 19:39:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000af6098d83a3bcb49aa03000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040060b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000000000000000000000000009fc488f99b8ebe3669bfb2ff781cfada5eb68cdda8229b0701a96aa92be395eab649b6d0809dc23dbe449ea0bf6b1b5d93335ed933eacf1dff55b64a85cb3d2bac08000000f4ffdba0a204bf1b1d687d3c36f605a3a749ce"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x5, 0x10000) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000100)={0x7b, 0x0, [0x6, 0x100000000008]}) [ 922.189531] IPVS: ftp: loaded support on port[0] = 21 19:39:53 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xfc03000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x5]}}}]}, 0x30}}, 0x0) 19:39:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}}]}, 0x70}}, 0x0) 19:39:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702050008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007df7ffffff00000000006a0a00858ded147cea85640f48bafe00000000850000000d000000b700000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x2000000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:53 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x7, 0x1, 0x4, 0x7, 0x0, 0x48, 0x840, 0xd, 0x1f, 0xfff, 0x81, 0x77, 0x5, 0x3, 0x4, 0xfffffffffffff964, 0x5, 0x80000001, 0x4, 0xff, 0x4, 0x454c729b, 0x91, 0x5, 0xef, 0x0, 0x100000000, 0x6, 0x2, 0x8b5, 0x73, 0x400, 0x4, 0xfff, 0x1, 0x7, 0x0, 0x214a, 0x3, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x2, 0x40, 0x0, 0xffffffffffffffe1, 0x64, 0x80}, 0xffffffffffffffff, 0x2, 0xffffffffffffff9c, 0xa) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000280)={0x0, @multicast2}, &(0x7f00000002c0)=0xc) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000300)=r2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) sched_getattr(r3, &(0x7f0000000180), 0x30, 0x0) 19:39:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}]}, 0x30}}, 0x0) 19:39:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}]}, 0x70}}, 0x0) [ 922.830572] IPVS: ftp: loaded support on port[0] = 21 19:39:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_MODULATOR(r1, 0xc0445636, &(0x7f0000000100)={0x5, "db3ce89fc9dca09c099da6be46a44d1eb9ed0ced7040e6bb9267a499eb232aac", 0x100, 0x401, 0x6, 0x0, 0x3}) 19:39:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x10010000]}}}]}, 0x30}}, 0x0) 19:39:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x7fffffff, 0xfffffeff, 0x0, 0x3fffffffc, 0x0, [], 0x0, 0x9}, 0xfffffffffffffea2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 923.411859] IPVS: ftp: loaded support on port[0] = 21 19:39:54 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}}]}, 0x70}}, 0x0) 19:39:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x1100]}}}]}, 0x30}}, 0x0) 19:39:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b71d0000000000008500000000000000"], 0x0}, 0x48) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001880)='/dev/vga_arbiter\x00', 0x100, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f00000018c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x80000001, 0x480) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@ipv4={[], [], @remote}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f0000000080)=0xe8) sendmsg(r2, &(0x7f0000001840)={&(0x7f0000000280)=@ll={0x11, 0x7, r3, 0x1, 0x4, 0x6, @remote}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000300)="6a6fbed59ad49e664ee12741f9bd6111be05f2031adf35d30d073b2471", 0x1d}, {&(0x7f0000000400)="d25f89a53b7d5afa9afaa7e060a622b8f0197f6bc94e08b17b25ec12cdc6cf3d9b1f999486c930517b6deec1b7b0d8e28e1997e99abaf860e07890d3685a9d1e2d2ba613b76431f5ff57f0e6529767c3dcaa1552980e59012a83bc700ba378f4e73f3c477664e4d219f034108feb2260c3f89b09bbe254cfa725c3fed15c7dfe203b1863747deaebbc2814cd76852d9b4f1f6f366cee4480", 0x98}, {&(0x7f0000000340)="616bc65e1813506637a2a71d96a028da111f699991aa85c3b5e0e72c7f2a7e5c2da11c60c725d51d8909322e59490b8a5ba6a9a6", 0x34}, {&(0x7f00000004c0)="6735da389277bdc7a123cb425638f821df205fcb9ad681e1f97ddd6a0bbfe7e59a36a988f31be194ddc0cca778addf38aa1011296ddba658106b673b1ddebbb1d6b5e79af2eb4dae2b78cc93f52b47e2e2743b7de5f92ac0c4370a4689f52d9943238103131e0a508cba387aaefe0a7b5b2d64e5525f1551d01377733fe92be8e1bf5d68449033d503740723893cdfffe8df17c6b787ccda9a31692cce931a0fc424303258bf0f028ffeec30882bfe69b6e2ad08010dbcb313333eb8171066c5d503869f2a813b89cbf263b1db90a8d26502a01b0727447ce59a4cd8fbb3935af2aedfa6cd58e3a5482d4ec32397b624c84242b916344753", 0xf8}, {&(0x7f00000005c0)="21b38330c79c2f463c19a0c0d5be15e61ef333d2e8d9edce3145dd2dabb426b35ab3b1a1cd76abd51715e33ecd179cada3a9ff65464b7cf6334793351e16999ef5f5f265c90fe2617e12306b48bf18f160504a5f1cbcfa9736280371a09efcecb9b29c9e6a16416ecb4c98512142997a0664f464ec6edef7206a62ff32928578998b6d04fd7f760c9ab95f675076418ba10b1148b48d1c3db763de8bdbb5641a29dc7a565f6ab12d207732acb8ed67f7386a69b2b3a34bed6184d32dfec347afc5121744", 0xc4}], 0x5, &(0x7f0000000740)=[{0xe8, 0x115, 0x100000000, "453b0cd88c68b89529d92c6f1e89ca75b73bbd24fe10fa1d32ab01edf03ec4cce2f3cfa26913c379e64818b5d8197024e790522d84259789bd590a5122744120d4be482b11ad3128d6c8d4a3349b14b94353421e46dc13b220ec610c20ec1272c60207041952f3aeb50c19df37054634548528fc2b6322b37211924cb8b5febd1ac8825318158fd75c3bf5a465c298b21f42c651963329ade5ca13c46a3e43f1abbe7d8a760c08a1cd7a4b9f200485c64bdaff221867eb3b4bf6ddf25f2cf0476aa5ae0d919f7a755fb778bcde7da880c7c21f6a74b7"}, {0x1010, 0x11d, 0x2, "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"}], 0x10f8}, 0x10) 19:39:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x1a0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:54 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x4000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:54 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:54 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x9]}}}]}, 0x30}}, 0x0) [ 924.049682] IPVS: ftp: loaded support on port[0] = 21 19:39:54 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]}}}]}, 0x70}}, 0x0) 19:39:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x2, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0], 0x0}, 0xfffffc9d) 19:39:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x110]}}}]}, 0x30}}, 0x0) 19:39:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}}]}, 0x70}}, 0x0) 19:39:55 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x80000, 0x0) bind(r0, &(0x7f0000000280)=@in6={0xa, 0x4e23, 0xc92, @local, 0x26}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="b702000008000000bfa3feffff7a0af0fff8ffffff79a4f0ff0000e00f471c880081d304040001000000ef6d81ed190a134b80ab0404000001e4d792363fe70d900000006a0a00fe00000000850000000d000000b70000000000000095000000000000000000000000000000000000000000000000000000000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x9, 0x4000) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000080)={0xb44, 0x3, 0x10000, 0x40, 0x8, 0x8000, 0x5, 0x6, 0x4, 0x1000003, 0x7ace, 0x3}) 19:39:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xfcffffff00000000]}}}]}, 0x30}}, 0x0) 19:39:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x12000000]}}}]}, 0x30}}, 0x0) [ 924.706142] IPVS: ftp: loaded support on port[0] = 21 [ 924.747768] kauditd_printk_skb: 10 callbacks suppressed [ 924.747785] audit: type=1326 audit(1545075595.565:884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4167 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 924.811282] audit: type=1326 audit(1545075595.635:885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4170 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x42, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 924.994142] audit: type=1326 audit(1545075595.815:886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4215 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:56 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x5a01, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}}]}, 0x70}}, 0x0) 19:39:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x5}, 0x48) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x82, 0x0) ioctl$RTC_PIE_ON(r1, 0x7005) setsockopt$inet_dccp_int(r1, 0x21, 0xf, &(0x7f0000000080)=0x3ff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}]}, 0x30}}, 0x0) 19:39:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 925.252566] Unknown ioctl 28677 [ 925.264514] audit: type=1326 audit(1545075596.085:887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4220 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf0ffffff]}}}]}, 0x30}}, 0x0) [ 925.301823] Unknown ioctl 28677 19:39:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) r1 = fcntl$dupfd(r0, 0x0, r0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)="1199bdd1601ef6dfc8180b1c5e332e8090ba53897278255a13f16299afea82aa1f0cabf760be6c4a936c056e0752bc7ab399ec6be95b547aa45744288aaf75615f", &(0x7f0000000100)=""/56}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x2}, 0x28) [ 925.354860] IPVS: ftp: loaded support on port[0] = 21 19:39:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}]}, 0x70}}, 0x0) 19:39:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x600]}}}]}, 0x30}}, 0x0) 19:39:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000007a0a00fe00000000854000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) fstat(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = request_key(&(0x7f0000000340)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000280)='!\x00', 0xfffffffffffffffb) keyctl$get_persistent(0x16, r1, r2) request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='!\x00', r2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000400)={'filter\x00'}, &(0x7f00000002c0)=0x78) 19:39:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x13]}}}]}, 0x30}}, 0x0) [ 925.795136] audit: type=1326 audit(1545075596.615:888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4215 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]}}}]}, 0x70}}, 0x0) [ 925.949608] IPVS: ftp: loaded support on port[0] = 21 [ 926.055254] audit: type=1326 audit(1545075596.875:889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4220 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:57 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x18a, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:57 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x101000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0xfffffc3b, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff]}}}]}, 0x30}}, 0x0) 19:39:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}}]}, 0x70}}, 0x0) 19:39:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x1cc4d6, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 926.514852] audit: type=1326 audit(1545075597.335:890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4269 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000408000000bfa30000000010000703000000feffff7a0aff00000000b7060000ffffffee2d64050000000000650404000100000004040000019b7d60b7030000590000006a0a00fe00000000850000000d000000b7000000000000009500000000000088fd0000000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r1 = accept(0xffffffffffffff9c, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000100)=0x80) accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x80800) [ 926.596062] audit: type=1326 audit(1545075597.415:891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4268 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 926.617906] IPVS: ftp: loaded support on port[0] = 21 19:39:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xa00]}}}]}, 0x30}}, 0x0) 19:39:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}]}, 0x70}}, 0x0) 19:39:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0xff5e) 19:39:57 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000]}}}]}, 0x30}}, 0x0) 19:39:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa300000000000007862503000000feffff7a0a40fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe0000000085000000000000950000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 927.161163] IPVS: ftp: loaded support on port[0] = 21 [ 927.310918] audit: type=1326 audit(1545075598.125:892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4269 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 927.377238] audit: type=1326 audit(1545075598.155:893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4268 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:39:58 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x3001000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}}]}, 0x70}}, 0x0) 19:39:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000000688493818e60ce8fa3ce6e088f68a787abb86e5f907804a85e82ac060df12a210479bfac524af4d1ef518e747fa45c5c67c66"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}}]}, 0x30}}, 0x0) 19:39:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0xffffffffa0010000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xff, 0x20000) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000280)=""/205) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x1200000000000000]}}}]}, 0x30}}, 0x0) [ 927.666740] IPVS: ftp: loaded support on port[0] = 21 19:39:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}]}, 0x70}}, 0x0) 19:39:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="2f8b83ebbf79bd13836f7347bfc043ddb702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703005871a470fb570000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:39:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xa000000]}}}]}, 0x30}}, 0x0) [ 928.137783] IPVS: ftp: loaded support on port[0] = 21 19:39:59 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xb4010000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:39:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x3d9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x3d) 19:39:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xfcffffff]}}}]}, 0x30}}, 0x0) 19:39:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}}]}, 0x70}}, 0x0) 19:39:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0xffffffff00000000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:39:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x1001]}}}]}, 0x30}}, 0x0) 19:39:59 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00', 0xffffffffffffffff}, 0x30) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$reject(0x13, r1, 0x8, 0x3, r2) sched_setscheduler(r0, 0x100000000002, &(0x7f0000000100)=0xfffffffffffffff7) r3 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x1fffffffe0, 0x44100) getsockname$packet(r3, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) [ 928.572691] IPVS: ftp: loaded support on port[0] = 21 19:39:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}]}, 0x70}}, 0x0) 19:39:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0x6, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xd, 0x1, &(0x7f0000000040)=@raw=[@ldst={0x1, 0x0, 0x7, 0x7, 0x7, 0xfffffffffffffff9, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000400)=""/4096, 0x41000, 0x1, [], 0x0, 0x5}, 0x48) 19:39:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x6]}}}]}, 0x30}}, 0x0) 19:39:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x408001) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x7}, 0xfffffffffffffe61) fremovexattr(r0, &(0x7f00000000c0)=@known='system.sockprotoname\x00') [ 929.117946] IPVS: ftp: loaded support on port[0] = 21 19:40:00 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xd600, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}]}, 0x70}}, 0x0) 19:40:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x2]}}}]}, 0x30}}, 0x0) 19:40:00 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000040)={0x3ff, @dev={[], 0x16}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000395936378f7f1fde14fdc51289a803a8b0e83897e6a9af3e696ead112bc27e99c1e4974c139e8afc0c4d09f48f41a9d8d0d5b36cbfd0d5278d949c756d65560b1e798eb57afb792572cd925f55c8eb969f42"], 0x0}, 0x48) ioctl$TIOCSTI(r0, 0x5412, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x100000000000000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x1200]}}}]}, 0x30}}, 0x0) 19:40:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404d7af7429ad83142a0001007d60b7030000000000006a0a00fe0000e502cd870dffff240000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 929.635795] IPVS: ftp: loaded support on port[0] = 21 19:40:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]}}}]}, 0x70}}, 0x0) 19:40:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf]}}}]}, 0x30}}, 0x0) 19:40:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0xfffffffffffffe56, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000280)=0x14, 0x800) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1, 0x1, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x400, 0xc, 0x4, 0x6, 0x10, 0x4}], &(0x7f0000000080)='GPL\x00', 0x5, 0xb3, &(0x7f0000000100)=""/179, 0x41000, 0x1, [], r1, 0xd}, 0x48) 19:40:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}}]}, 0x30}}, 0x0) [ 930.205626] IPVS: ftp: loaded support on port[0] = 21 [ 930.371493] kauditd_printk_skb: 10 callbacks suppressed [ 930.371508] audit: type=1326 audit(1545075601.195:904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4394 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 930.427923] audit: type=1326 audit(1545075601.225:905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4395 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:01 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x9403000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000040)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0xffffffffffffff97) 19:40:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}}]}, 0x70}}, 0x0) 19:40:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x9000000]}}}]}, 0x30}}, 0x0) 19:40:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x42000000, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 930.755953] audit: type=1326 audit(1545075601.575:906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4437 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x3f00]}}}]}, 0x30}}, 0x0) [ 930.814055] audit: type=1326 audit(1545075601.615:907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4440 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b707000008000000bfa30000c50819294ec99069c7b77d58bf6bb3b3000000000703000000feffff7a0af0fffcffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000484000001007d60b7030000000000006a0a00fe0000000085000000e2860000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe1, 0xf4, &(0x7f0000000100)="321b5a5d46e4175dd06888ef974c84ac45a4adefd824448eb16f48ede78d27518f33168c785d31bb6d16dadc6144d04be8789c09e392d3b165410c2b2e8a9f8d2a58146988dea4970f5c86a6378c21a60cba56b60cacd326b80ce14be30fdfe27a69b4a654b260c7723335614122326f9f9e36af3c58ceb0a4c0e35765dc631a3691fcf7fdc5c77c0f253cda47bf968984dfb0e2eb1f4d1a49eee1df9ae5483b23c03a8116d61139573a1003204f16138b3ad571b995526e6ddeabd61631a826d063d1844b96f3d72b1b026559fb46ffe03bbe1714740693627bc31a67784226ec", &(0x7f0000000280)=""/244, 0x7fffffff}, 0x28) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x6, 0x1) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000000580)=0x5) write$P9_RLCREATE(r1, &(0x7f0000000440)={0x18, 0xf, 0x2, {{0x2a, 0x2, 0x6}, 0x7}}, 0x18) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f0000000480)={0x1, [0x29f2, 0x7, 0x8b62, 0x5, 0x8c, 0x400, 0x5, 0x1, 0x84, 0x1, 0x4, 0x0, 0x6000000000000000, 0x5, 0x3, 0x1, 0x279, 0xfffffffffffffff8, 0x4, 0x0, 0x9, 0x97b9, 0xd5, 0x3ff, 0x401, 0x3, 0x2ec, 0x2, 0x5, 0x2, 0x7, 0x9, 0x80000000, 0x7fff, 0x81, 0x7, 0x5, 0x61f, 0x3152384, 0xfffffffeffffffff, 0x9, 0x7fff, 0xffff, 0xf02, 0x6, 0x2, 0xffffffffffffffc1, 0x3], 0x6}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 930.875921] IPVS: ftp: loaded support on port[0] = 21 19:40:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}}]}, 0x30}}, 0x0) 19:40:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}}]}, 0x70}}, 0x0) 19:40:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b706a6ed9a061e420000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x180000000000000a, 0xfffffffffffffdc1, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879eb63646", 0x0, 0x69}, 0x28) 19:40:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x13000000]}}}]}, 0x30}}, 0x0) [ 931.484244] IPVS: ftp: loaded support on port[0] = 21 [ 931.541975] audit: type=1326 audit(1545075602.365:908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4437 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 931.588702] audit: type=1326 audit(1545075602.395:909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4440 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:02 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x2000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}}]}, 0x70}}, 0x0) 19:40:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702002f2f0000000703000000f8ffffff79a4f0ff00000000b706000005000000000000000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000010d000000b7000000000000009500000000000000"], 0x0}, 0x48) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)="aabd01697a73cfc27416f9f65b1c20161036cfc99f530d304a9df66f8658b92d79104f19c69580582c381cc182519b932abd583fcf010b7ed1696e58aa9d60a489f3979a81761ba973b0dcc32f4bedc1f805a4e0e1313351b63eafa1f1724204caa1fe757c9d95ff06a523864798b53849db1907377f11d4fd3cab7c7df602197e", 0x81}, {&(0x7f0000000040)="02ab16a77e4803377a2c1a6bfc41eda496e91b3e1a5b66bfaae2d304cf600f08ab6392dce5dc063c48a54a0178d2fd0baf277ba1e054cb296ab64cb27007fd25089a0318ceed4180bf88be21d3", 0x4d}], 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r1 = socket$inet6(0xa, 0x80000, 0x6) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x9, 0x3, 0x320, 0x138, 0x0, 0x0, 0x0, 0x0, 0x250, 0x250, 0x250, 0x250, 0x250, 0x3, &(0x7f0000000280), {[{{@uncond, 0x0, 0x118, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0xd, 0x8, 0x0, 0x1}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x1, 0x4, 0x3ff}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x380) 19:40:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xb00]}}}]}, 0x30}}, 0x0) 19:40:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x1005) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 932.099818] audit: type=1326 audit(1545075602.915:910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4480 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x80ffffff]}}}]}, 0x30}}, 0x0) 19:40:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}}]}, 0x70}}, 0x0) [ 932.204361] audit: type=1326 audit(1545075602.945:911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4481 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockname(r1, &(0x7f0000000180)=@generic, &(0x7f0000000280)=0x80) r2 = socket$netlink(0x10, 0x3, 0x1f) sendto(r2, &(0x7f0000000040)="d3c5aee755b339617e63e20d65aa0f32ab7a59254d471694d1b9469b674012f429f52540d41e0a0a63e00cf772f932718a6c8688f282e8837b12d87311c669ee1ce23c68329691f34a88a9c012c2a037ef7ce538", 0x54, 0x4080, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x4, @local, 'ip_vti0\x00'}}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 932.293166] IPVS: ftp: loaded support on port[0] = 21 19:40:03 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xffffff80]}}}]}, 0x30}}, 0x0) 19:40:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}}]}, 0x70}}, 0x0) 19:40:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000005007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000080)=@generic={0x0, 0xffffffffffff8000, 0xd0d}) getpeername$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000280)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000400)={{{@in=@loopback, @in=@loopback, 0x4e23, 0x0, 0x4e22, 0x0, 0x0, 0xa0, 0x0, 0x87, r3, r4}, {0xc5d, 0x80000001, 0x80000000, 0xb4, 0x200, 0x4, 0x3, 0x8}, {0x9c5, 0xffffffffffffffc1, 0xffff, 0x2}, 0x7, 0x6e6bb2, 0x0, 0x0, 0x1, 0x3}, {{@in=@multicast1, 0x4d5, 0x2b}, 0x2, @in=@multicast2, 0x3507, 0x2, 0x3, 0x7, 0xffffffff7fffffff, 0x9cd6, 0x5}}, 0xe8) [ 932.813753] IPVS: ftp: loaded support on port[0] = 21 [ 932.891249] audit: type=1326 audit(1545075603.715:912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4480 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 932.937840] audit: type=1326 audit(1545075603.735:913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4481 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:04 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xe8020000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xffffff9e]}}}]}, 0x30}}, 0x0) 19:40:04 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80000, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000340)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYRES64=0x0], 0x0, 0x3, 0xfffffffffffffe68, 0x0, 0x0, 0x8000000000, [], 0x0, 0x200000000000000}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200500, 0x0) syz_open_dev$media(&(0x7f00000003c0)='/dev/media#\x00', 0x8, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000080)=0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={@mcast2, @empty, @loopback, 0x2, 0x9, 0x7, 0x400, 0x2, 0x400040, r3}) 19:40:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}]}, 0x70}}, 0x0) 19:40:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x403, 0x7) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x200000) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x3, 0x2) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @multicast1, @broadcast}, &(0x7f00000001c0)=0xc) 19:40:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:04 executing program 0: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000240)=""/190, &(0x7f0000000300)=0xbe) write$P9_RLCREATE(r0, &(0x7f0000000180)={0x18, 0xf, 0x1, {{0x20, 0x4, 0x7}, 0x3}}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x1d8, &(0x7f0000000340)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES32], @ANYBLOB="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", @ANYRES16, @ANYRESHEX], 0x0, 0x0, 0x11e, 0x0, 0x0, 0xffffffeffffffffd}, 0x48) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) signalfd4(r1, &(0x7f00000001c0)={0x4}, 0x8, 0x80000) symlink(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000140)={0x10, 0xfffffffffffffffe, 0x5}, 0x10) 19:40:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x1000000000000]}}}]}, 0x30}}, 0x0) [ 933.397918] IPVS: ftp: loaded support on port[0] = 21 19:40:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}]}, 0x70}}, 0x0) 19:40:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]}}}]}, 0x30}}, 0x0) 19:40:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000080)={0x2, 0x0, 0x10001, 0x100}) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000100)={r2, 0x2a}) 19:40:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}]}, 0x30}}, 0x0) [ 933.848704] IPVS: ftp: loaded support on port[0] = 21 19:40:05 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x1fc, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x521000, 0x0) sendmsg$nl_route(r1, &(0x7f0000004c00)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000800}, 0xc, &(0x7f0000000680)={&(0x7f00000005c0)=@getrule={0x14, 0x22, 0x20, 0x70bd29, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000841}, 0x40) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000002c00)={0x0, 0x0}) fstat(r1, &(0x7f0000004fc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0)={0x0, 0x0, 0x0}, &(0x7f0000002d00)=0xc) r6 = fcntl$getown(r0, 0x9) lstat(&(0x7f0000004380)='./file0\x00', &(0x7f0000002d80)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() r9 = gettid() fstat(r0, &(0x7f0000002e00)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000002e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002f00)={0x0}, &(0x7f0000002f40)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002f80)={{{@in6=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000003080)=0xe8) r14 = getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004340)={0x0, 0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004300)='@vmnet1\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000004d40)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000004480)=0x4e) stat(&(0x7f00000044c0)='./file0\x00', &(0x7f0000004500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r18 = getpgrp(0xffffffffffffffff) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f00000043c0)=""/141) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004580)={0x0, 0x0}, &(0x7f00000045c0)=0xc) stat(&(0x7f0000004600)='./file0\x00', &(0x7f0000004640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r21 = getpgrp(0xffffffffffffffff) r22 = getuid() r23 = getegid() sendmmsg$unix(r2, &(0x7f0000004ac0)=[{&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000080)="e483027767a5eb", 0x7}, {&(0x7f0000000180)="f01d7ab5facd93924dfb44b450e821719b8cf059b5a25d4505c2f26004b7224342ce3f07e58c96e3b0700117e76c166d5cd1adbe8b61230e73d54e", 0x3b}, {&(0x7f00000001c0)}, {&(0x7f0000000280)}, {&(0x7f0000000400)="5a6aa54da955ac6dc83c9cb8333acd7c7035fba34986868498532f6f7ab4f757f99afbba0be7e91c253a1394803882402b106553e0c90d01af15f4cf6c45430c42bdf2d1c7215d3336a3f8f1dc6c2fd50196239519e5e2b49a0c5cbf9c6e3d78fc74e64293ada8319411acf2e955c37f6070a9af76b64efc77593913eddc5e51bd0e7899b6b0ad7f4b004217fd8805ba66fab28afde661c75114f68f3e5adb3d858f710fd489157fc360f7165f22f992c6906a8c9ada2c6179c4c8819803ffbb38ee3b892df6ff191e02b7c6eb90753c9fe92c85da", 0xd5}, {&(0x7f00000002c0)="1be40f361ccce71410c81f4c2dfad02bc887c35b7bca48e82a2fb86273c44a042018dfb85f21893aba0cb660643fff8ec12d20c7e36944c4c1a5dd5a2a0bdc2ef7e2226ef5847e071d6ae070f482965e67a2ac4c1abb4c4fb348e984b8959d9d4b223f4fb288fd5ad8fbd2515aad45ff6c17138394967c18e97de908a23da5e920a5083a7923e54511c7454fa870b525d3e6", 0x92}, {&(0x7f0000000500)="0fa078607c9309998413d77852f99938a90ed89255091bb36ca3f6395337954e8f39729d4790bd3d629010787da0c6891608e6998cdca660ce4fdf55025147a03147a916bd4288613f5d31734a19844bdf08dfa9578e275b4a885ea78018cd9a4ed2ab7b34159be4b0a45cdbbff72d01ee8316edea543389880668a6d2ac2a5fab6e2e30203dc32f52bf8e7955cf6e0e2563064b6326706bc9260f25d1aac5d5e339ab419e90b8d8cce5ebf21f6810e45d", 0xb1}, {&(0x7f00000005c0)}], 0x8, &(0x7f0000000680), 0x0, 0x4000}, {&(0x7f00000006c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002a40)=[{&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000001740)="7d11dd52c57dec31d827e880d9808f13f66eae2a9e8a5da8af7b0476a2dcd3ce7b160573ff1e9822c6e0ec68cbccfa12152a153fa55f50ecaeb6286fe96cf56008a76154519b27bdd05e69c805e16e4605b3244c4ca239922f2233ad8b653ec86932bf8aedec2f700963b853b2e27c025296a44db5f5ad94d9ff63b3d6488208c2d3dfbecd9aa5ad44d4409d81ba14b9b70387948bcea2d7dbce3c21a8e8eba03823388ea66403ab0cfcd07b76a97630df07c5614f2f0684e0e3968577", 0xbd}, {&(0x7f0000001800)="85ee511356e52023927e57922bae0e84de5417b73f6081c833876461e87203cd682e60539fb9138f0878b2f88ae56d30b7b18e0ce83bacf56544199db0b67e9fc4177a5994bfdaa40fcd264bad551d7facfb7df0d3b3291fa57f7f3855701cccd44fe78caba0ebead6711770709e98fa3e2e8f49ff735a9c970a29197d2af1d2447568d4dae80ff13062299bb3ce6c8b8afcf4a48356c077fc19ca6aa0c52a", 0x9f}, {&(0x7f00000018c0)="7323d82c84996299e56dc4969708d5460fef993955146c839be01d95330e1d06b09c6e962de783bda9f74bac0e7860cd60b8c5673887486cf37f2211e75cd80d078e1aa458f51d09da182b295d636ea755f4232fff4daa590b55bcb727aec42611f3d20b7a9552eccb885e4e3403f400dd3f71bc4cccf94b1353bea1009f0c7d7c654ff326b1bc027a2bf6abf3ae47a891b2fcbf85ea5cfdcb082fb27ea2ad331738ab73b6d86d", 0xa7}, {&(0x7f0000001980)="a89f8a86e6001d85e17f91d114203e547d8447093d82164d6886663964b2b15ee60399e0942d6cbe183517aef3d1a4047ec04392aa6e0a9794c157f6772cd35991cc957c2af96160e0eb99048d09dbf2209a8ce99d684eb9227088999ee499a3ea30d8210476d112ad35d533146610884a9865121fdbba0e0d325b1cf558ec67ad18a84938334555fb", 0x89}, {&(0x7f0000001a40)="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", 0x1000}], 0x6, 0x0, 0x0, 0x24000000}, {&(0x7f0000002ac0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000002bc0)=[{&(0x7f0000002b40)="c2174a70d2f5c855dc47e160b7a4e8c3dee7bc5fe339592d299c8dc3b788a990da1ac4dc81504f13ecf79891baa435158bf0", 0x32}, {&(0x7f0000002b80)="b469bd99294640796c6412d28704f45aa72f6e7b3b", 0x15}], 0x2, &(0x7f00000030c0)=[@rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @cred={0x20, 0x1, 0x2, r12, r13, r14}], 0x98, 0x4040080}, {&(0x7f0000003180)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f00000042c0)=[{&(0x7f0000003200)="44017b93f158fc5e17df88acd7894c5a4b55fc556509d54246ddeea61ed53efcc2d5406a747f6807eec6cfcc857ca1a8a85c97e57f490c49e4f421daa801feeab640b6a9df1ba9085c6fea523a55364dcc44000837239d192c0b936c05a35d29a55dd9547041c53c8145ff00cd118f388eff971f227407493a699115013f8e2cb5e1b75078c4d35ecba17bdea82b22a3c1ec27919a1d0e", 0x97}, {&(0x7f00000032c0)="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", 0x1000}], 0x2, &(0x7f00000046c0)=[@rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}], 0x100, 0x8000}, {&(0x7f00000047c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000004a40)=[{&(0x7f0000004840)="d6f7442cea8033", 0x7}, {&(0x7f0000004880)="b509d1d91133813e36fd708c402454060b6fb3353b3734169ba84ec39d4f4a636c5fd7225ca084b6ab943fa17cc0ae483d3ed4520c6cfd8777584d5d68018d27ff3b1e7463f4de88c4e5933ab4e58e4e279d2fd76704f63d9980ed55da40cfdda2f3688466806cbc35355b970cc9b1527a4977af54d48d6f9d1f70f562c4ad78728266d15ccf247adb38fea5af83011c1a79145e2ac58522042b55cfc934ea2a1367f4f0299741358f247561e6e8258e068dc3651bbd50fdaf7d9b0de1e6d166d6278b", 0xc3}, {&(0x7f0000004980)="799fd91b7089ccf3d8e8daa48e686d69bf73c06c6d1a13c57018e4fe34d58f5f1ecf374dac793c90a19725e9f09387f3add614813357667874a2c2b947b61960590779792e46959c977acb4c4338e230969546f145072499bf4550f8285ac17f144bb6e6faf11da13cf1369ae33062e277783e351d37c0b62b12389bd5e84be8585c02432941de8956d92f5a82", 0x8d}], 0x3, &(0x7f0000004a80)=[@cred={0x20, 0x1, 0x2, r21, r22, r23}], 0x20, 0x8800}], 0x5, 0x40084) 19:40:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}}]}, 0x70}}, 0x0) 19:40:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x11000000]}}}]}, 0x30}}, 0x0) 19:40:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000040), 0x2) 19:40:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffe8ff79a46874d29d824d6a03f0ff00cf07000000000000ffffff2d6405010000000065040400010000000404000001007d60b7030000f88ee9bab4509444af7e000000006a0a00fe00000000850000000d000000b700000000000000d7000000000000000326f022e09d88ecc45cb11a4d0ce2013493d60f"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 934.330026] IPVS: ftp: loaded support on port[0] = 21 19:40:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}}]}, 0x30}}, 0x0) 19:40:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}]}, 0x70}}, 0x0) 19:40:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xe971, 0x8801) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000080)=0x8, 0x2) 19:40:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf0]}}}]}, 0x30}}, 0x0) 19:40:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r1 = open(&(0x7f0000000180)='./file0\x00', 0x101000, 0x1) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000001c0), &(0x7f0000000280)=0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000100)=0x1000000000000000, &(0x7f0000000140)=0x4) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000080)={'ifb0\x00', {0x2, 0x4e21, @local}}) [ 934.879126] IPVS: ftp: loaded support on port[0] = 21 19:40:05 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xe01000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}]}, 0x70}}, 0x0) 19:40:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xfffffffc]}}}]}, 0x30}}, 0x0) 19:40:05 executing program 0: openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/context\x00', 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) socket$inet6(0xa, 0x803, 0x5) [ 935.264202] IPVS: ftp: loaded support on port[0] = 21 19:40:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:06 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x9, 0x400001) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) mknodat(r1, &(0x7f0000000080)='./file0\x00', 0x10a0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000c4000000000000009500000000000000"], 0x0}, 0x48) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bond\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bcsh0\x00', r3}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x8]}}}]}, 0x30}}, 0x0) 19:40:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}}]}, 0x70}}, 0x0) 19:40:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) r0 = socket$inet(0x2, 0x801, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 19:40:06 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x1300000000000000]}}}]}, 0x30}}, 0x0) 19:40:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000080)={0x8, 0x41323151, 0x1, @stepwise={0x200, 0x80, 0xc52, 0xdb75, 0x100, 0x8}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 935.418013] kauditd_printk_skb: 9 callbacks suppressed [ 935.418028] audit: type=1326 audit(1545075606.235:923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4630 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 935.896530] IPVS: ftp: loaded support on port[0] = 21 [ 936.178815] audit: type=1326 audit(1545075606.995:924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4629 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 936.219476] audit: type=1326 audit(1545075607.035:925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4630 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}]}, 0x30}}, 0x0) 19:40:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}}]}, 0x70}}, 0x0) 19:40:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) exit_group(0x7878) 19:40:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x823, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:07 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x800000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 936.410010] audit: type=1326 audit(1545075607.215:926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4653 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000086a0a00fe0000000085000088b60da429ee4fc771000d000000b7000000000000"], 0x0}, 0x48) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x440902) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000080)={0x1, 0x7fffffff, 0x1, 0x404}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xfffff000]}}}]}, 0x30}}, 0x0) 19:40:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]}}}]}, 0x70}}, 0x0) [ 936.513578] audit: type=1326 audit(1545075607.275:927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4658 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 936.527997] IPVS: ftp: loaded support on port[0] = 21 19:40:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x2000000]}}}]}, 0x30}}, 0x0) 19:40:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500005d9a34944079e391ddf53bbf51c605d8000d000000b70000000000000095000000000000005f117fa8aef63554f496865e768ebb0de9552d02eaf7e4466ec3c158b77a92caef2e68fb5519742dedd6d87859972684f45e07dc0653809a2e54c01b7077a0c92c4f85f6e849ca24592a7a861a8ca6b8a0d7427f1aaf4a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, [], 0x0, 0xfffffffffffffbfe}, 0xfffffffffffffece) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000040)="b9e5f50703dc9ebf083613879e10", 0x0, 0x2}, 0x28) 19:40:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}}]}, 0x70}}, 0x0) 19:40:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xb]}}}]}, 0x30}}, 0x0) 19:40:07 executing program 0: openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x448a00, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x400, 0x400) name_to_handle_at(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)={0x7a, 0x200, "72c0250410b2c492e232e59e320afac9198f1a358b5a8f12ebeef670194157399bf1ff9820ca788484fd8eb16192050b9a6c05339f66329f46b3642ef334b423c8a1ca8fc6cb61582ac262b800f7f16aaf0d195c52000f04c8b6f5df43a41bbe5177a6365709f06956dfac49f6cb1ba61787"}, &(0x7f0000000340), 0x1000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x200000, 0x0) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f0000000140)) r2 = memfd_create(&(0x7f0000000100)='/dev/midi#\x00', 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x180000000000000a, 0x4e, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e1088479e6b299386de839f915514d7f02de0f08fa161ab092a34f5c8b22f17a9b2487395cd504cd9db7ec27ff27e6019d959fc9b000000000000000000000000000000", 0x0, 0x69}, 0x28) 19:40:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x4]}}}]}, 0x30}}, 0x0) [ 937.195528] audit: type=1326 audit(1545075608.015:928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4653 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 937.244245] audit: type=1326 audit(1545075608.065:929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4658 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x100000890f, &(0x7f0000000780)="0a5c2d0fc1085ff0ae4470d8f320e8c7797d88f385eb9b40d33a3018b7eb875423103d5f6764e6575c1efde6fcfc339b6548db87f2c1fe6d26bc5b5b1637f29c852c829a0aa675c55d900d227b724f757673e949a13e261df0847c579500924cb1b65d6c50a08bb03d83490c8aa88cda32328e000077c5a6943e760271337c2d0d52c202bee2713f18ebc68fb300d20d8b83107d155f1f02ebf0ac7646b1ddf4291852bb64000000000069602401710b06751b4ef3c2015e93258639e66c01c82c401274f90ee759c18f55968e947c123694f1540dc971ef123d5ff1259abd6b0e827d3c078fcb37146410cd9a9414b064cbd96dabc588a7d07c4a7889dffb8fcef1322fd11ac4411892a7f784b18ac8960ff73ff2e9aa37c891ccd1fa708bc1efc0883e7fd41afc7b060863e23dafae5855570500000000000000b14443dbea104a38b67dbb81b8529cf227ef1ca1a90f1fdb992f554a4b7b141f44e0c78f939bf31e4759d9369146fca3a6564c8dbe0f674034f40335e50800452c8f19d40a90c30ca9fb30a377abc744541817a253e84d982c715bf3e93d02e44eef3b88d9363d1cb8ebc99c00aa038a8894a306759a024512f026127f016fd82129e78c108befbf357e52fa594c2e3fad63ef1d7da719fc08a017026f32561243") r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[], 0x204) [ 937.353828] IPVS: ftp: loaded support on port[0] = 21 [ 937.371063] audit: type=1326 audit(1545075608.195:930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4702 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:08 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xd602000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}}]}, 0x70}}, 0x0) 19:40:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}}]}, 0x30}}, 0x0) 19:40:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x9, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x62040, 0x0) 19:40:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 937.896244] audit: type=1326 audit(1545075608.715:931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4711 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000004000009500000000000000"], 0x0}, 0x48) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x383400, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xac) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf000000]}}}]}, 0x30}}, 0x0) [ 937.996569] IPVS: ftp: loaded support on port[0] = 21 19:40:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}}]}, 0x70}}, 0x0) 19:40:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702004616000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:08 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x8000000]}}}]}, 0x30}}, 0x0) 19:40:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) r1 = fcntl$getown(r0, 0x9) getpgid(r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 938.154504] audit: type=1326 audit(1545075608.975:932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4702 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:09 executing program 3: seccomp(0x3, 0x1, &(0x7f0000000280)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x4a7) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x30, r2, 0x0, 0x70bd2b, 0x25dfdbfd, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000040)="decd4e92a43bf07ad1e8ee8ac8656a7bf6ff812f2120") [ 938.533283] IPVS: ftp: loaded support on port[0] = 21 19:40:09 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x3c01000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a424cc00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000005dbc00fe0000000085000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) socket$inet6(0xa, 0x0, 0x3) 19:40:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}]}, 0x70}}, 0x0) 19:40:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x6000000]}}}]}, 0x30}}, 0x0) 19:40:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x7}]}) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffa211, 0x420400) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x6a, 0x9, 0x100000000, 0x200000000}, {0x2, 0x1, 0x1}, {0x448, 0x0, 0x4, 0x5}, {0x1e, 0x2, 0x1, 0x20}, {0x7, 0x9, 0x761f1812, 0x5}, {0x7, 0x401, 0x5, 0xffff}, {0x53c, 0x7f, 0x1ff, 0x5}, {0x7, 0x7, 0x0, 0xffffffffffffffff}, {0xaaf152b, 0x4, 0x3, 0x2}]}) r1 = socket$inet6(0xa, 0x803, 0x5) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000100)={0x0, {}, 0x24, 0x9}) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:09 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x3000000]}}}]}, 0x30}}, 0x0) [ 939.113588] IPVS: ftp: loaded support on port[0] = 21 19:40:10 executing program 0: syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0xc0a, 0x20000) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000600000000000000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7c607a9edffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0x9, 0xfffffffffffffdc8, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x8}, 0x28) 19:40:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}}]}, 0x70}}, 0x0) 19:40:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x600000000000000]}}}]}, 0x30}}, 0x0) 19:40:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff5b0af0fff8ffffff79a4f0ff646f6edb43713160ffffffff2d6405000000000065040400010000000457750001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000459abfbf84dba67eeaa0df7d8aeaa75e77fa4d80e4b6c674be6246578ae5c0094dcebf5466236cc6bb6a43726810088647baab92534d56a4642ae169e7e6ba2111d38c7b1c33a33fe2"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x1000000]}}}]}, 0x30}}, 0x0) [ 939.653985] IPVS: ftp: loaded support on port[0] = 21 19:40:10 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xd003, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}]}, 0x70}}, 0x0) 19:40:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1, &(0x7f0000000380)=ANY=[@ANYRES64], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200, 0x0) setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f00000002c0)=0x2c5, 0xfffffffffffffe01) 19:40:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf000]}}}]}, 0x30}}, 0x0) 19:40:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f00000000c0)=[0xee00, 0xee01, 0xee01]) lchown(&(0x7f0000000000)='./file0\x00', r1, r2) 19:40:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x200000000000006c, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000fefffff53e6a3cf8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007df408f1b500000000006a0a00fe00000000850000000d000000b70000000000000095000000f4500000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xb}, 0x48) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xa84, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x13) 19:40:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}]}, 0x70}}, 0x0) 19:40:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x3]}}}]}, 0x30}}, 0x0) [ 940.082537] IPVS: ftp: loaded support on port[0] = 21 19:40:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x13, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRESHEX, @ANYBLOB="64287cc69d18bd210d01806e8c029f516f2f", @ANYRESDEC, @ANYPTR=&(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRESDEC, @ANYPTR, @ANYPTR, @ANYRESOCT, @ANYRESDEC=0x0, @ANYRESOCT, @ANYPTR64], @ANYRES64, @ANYRES16, @ANYRES64, @ANYRES64, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRESOCT, @ANYRESHEX], @ANYRESHEX], @ANYRES64, @ANYBLOB="9b3bb61d3b2c804f122b1de3f2f5a5c285c7c1d905e963db445c751dc901db8d2b3fb8c86c399532f1f8ede657867d4623d02677b9a01681531e5cfdac4992a6499a16e2be2c96d267224bb68f6983d9f5e0db03aa5a30cba71956f532213819dc8d2b29b3f8a64b23e38ddb861e074b3b5000", @ANYRESHEX, @ANYRES16, @ANYRES32=0x0], 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, [], 0x0, 0x9}, 0x48) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000100)=0x80) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x40, r3, 0x30a, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x15}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xf5b3}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x20008010) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000140)={@dev={0xfe, 0x80, [], 0x20}, 0x7, 0x1, 0x1, 0x4}, 0x20) r4 = syz_open_dev$sndpcmc(&(0x7f00000005c0)='/dev/snd/pcmC#D#c\x00', 0x5, 0x0) r5 = syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0x9, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x15, 0x8, &(0x7f0000000640)=@raw=[@jmp={0x5, 0x0, 0xd, 0x8, 0x0, 0xfffffffffffffffe, 0xfffffffffffffff0}, @jmp={0x5, 0x1f, 0x6, 0xf, 0x6, 0x184, 0x1}, @exit, @map={0x18, 0xa, 0x1, 0x0, r4}, @ldst={0x0, 0x2, 0x0, 0x5, 0xb, 0xfffffffffffffff4, 0xfffffffffffffff0}, @map={0x18, 0x7, 0x1, 0x0, r5}], &(0x7f0000000680)='syzkaller\x00', 0x81, 0x9, &(0x7f00000006c0)=""/9, 0x41100, 0x1, [], r2, 0x7}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x1000000000000069}, 0x28) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000540)) 19:40:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x12]}}}]}, 0x30}}, 0x0) 19:40:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff]}}}]}, 0x70}}, 0x0) [ 940.487980] IPVS: ftp: loaded support on port[0] = 21 [ 940.811029] kauditd_printk_skb: 7 callbacks suppressed [ 940.811046] audit: type=1326 audit(1545075611.635:940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4801 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:11 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xfc03, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000080), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}}]}, 0x30}}, 0x0) 19:40:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}]}, 0x70}}, 0x0) [ 940.863744] audit: type=1326 audit(1545075611.685:941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4802 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:11 executing program 3: r0 = inotify_init1(0x80800) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x5, 0x8}) r1 = socket$inet6(0xa, 0x803, 0x5) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendto$unix(r2, &(0x7f0000000180)="ce3da21dd34073f41c23e9210f38f192946daead752b41c16a19a66d7b4e7c141b3aefe6182c4e8869ab72dbb7bab0a24442dc737da0dbb1d0ce0cca113032e8c5dd6d2bb49cce4b4d745361e4feb93aae87eb62173b46b5570f59783ecb0fb391a18eba4cdb41820d350a08ac04547ba1de3b250843f86b7d64e6b03f7b4f6c2f1b9a4d874692c5d0bbbf6a18c511cdb76573ab93ab98764a3a734ecee82121ae843848eb14cfd4abd9b55cf25b146584297a30d0dc60afd57b8777d687f4391fe129ac6ee8c728ee971e2df564d7ac608b1020284e9b955da5963b06f8c2eb6ab28b1372dd11185b905bf916483351", 0xf0, 0x4, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f00000003c0)=[@in={0x2, 0x4e24, @loopback}], 0x10) 19:40:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x4000000]}}}]}, 0x30}}, 0x0) 19:40:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000080000bfa30000000000000703001a618ebfc0ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60c3030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000000000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0x13, 0x277, &(0x7f0000000100)="b90703e689260000000000000003879e108847", 0x0, 0x69}, 0x28) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) write$P9_RWRITE(r1, &(0x7f0000000080)={0xb, 0x77, 0x1, 0x80000001}, 0xb) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x13}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={r2, 0x2, 0x9}, 0x10) [ 941.027160] audit: type=1326 audit(1545075611.845:942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4851 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") socket(0x9, 0x80000, 0x3f) 19:40:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}}]}, 0x70}}, 0x0) 19:40:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf00]}}}]}, 0x30}}, 0x0) [ 941.188322] IPVS: ftp: loaded support on port[0] = 21 19:40:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000080)={0x0, 0xef}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={r2, 0xfffffffeffffffff, 0x6}, &(0x7f0000000180)=0x8) [ 941.222167] audit: type=1326 audit(1545075612.045:943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4866 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 941.599194] IPVS: ftp: loaded support on port[0] = 21 [ 941.819318] audit: type=1326 audit(1545075612.635:944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4851 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:12 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x2a01000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xfffffff0]}}}]}, 0x30}}, 0x0) 19:40:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x180000000000000a, 0xe, 0x167, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x6c}, 0x28) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x105000, 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000400)=""/4096) 19:40:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}]}, 0x70}}, 0x0) 19:40:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x1001000000000000]}}}]}, 0x30}}, 0x0) 19:40:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) r1 = socket(0x11, 0x80000, 0x22) bind$unix(r1, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) close(r1) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1b4, 0x80) epoll_wait(r2, &(0x7f0000000080)=[{}, {}, {}, {}, {}], 0x5, 0x401) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000300)={0xff, 0x1, 0x86, 0xfbd, 0x8}) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000100)={0x29e932efae611a63, @vbi={0x40, 0x7fffffff, 0x870, 0x7f377f5f, [0x100000001, 0x11], [0x9, 0x7ff], 0x108}}) [ 941.976385] audit: type=1326 audit(1545075612.795:945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4891 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:12 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}]}, 0x30}}, 0x0) [ 942.044755] audit: type=1326 audit(1545075612.825:946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4866 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80000, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0xffffffff7fffffff, 0x4) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x100a, 0x1) socket$inet6(0xa, 0x5, 0x2000000ecb) 19:40:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}}]}, 0x70}}, 0x0) [ 942.107598] IPVS: ftp: loaded support on port[0] = 21 19:40:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], 0x0}, 0x48) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x9, 0x0) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000080), &(0x7f0000000100)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x9effffff00000000]}}}]}, 0x30}}, 0x0) [ 942.218481] audit: type=1326 audit(1545075613.035:947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4913 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 942.590862] IPVS: ftp: loaded support on port[0] = 21 [ 942.765380] audit: type=1326 audit(1545075613.585:948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4891 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 943.015815] audit: type=1326 audit(1545075613.835:949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=4913 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:13 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xf2, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}]}, 0x70}}, 0x0) 19:40:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) poll(&(0x7f0000000040)=[{r0, 0x4}, {r0, 0xa000}], 0x2, 0x3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0x0, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x3}, 0xffffffffffffff16) 19:40:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x5000000]}}}]}, 0x30}}, 0x0) 19:40:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:13 executing program 3: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000240)="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", 0xfb, 0xfffffffffffffffa) keyctl$describe(0x6, r0, &(0x7f0000000080)=""/179, 0xb3) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r1 = socket$inet6(0xa, 0x803, 0x5) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:14 executing program 0: socket$inet6(0xa, 0x80800, 0x1) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000400)='/dev/amidi#\x00', 0x1ff, 0x20000) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f0000000440)=0xfffffffffffffed0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000000c0)={0x2, 0x6, 0x1ff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x31, &(0x7f00000007c0)=ANY=[@ANYRESHEX, @ANYRES16, @ANYBLOB="6b5b71b5aff49002e8238f541c001ce5a20c85abab013a43798e3056141df4eb730daf566c480a67c897ea5ae836ab60176b4f8a7cc6de340642ae8bcd22609bb78aa4ca93f9abb760a8f8f4f4491114eb98f421d8c5e4bfa66c5668588c3acde072", @ANYRESDEC, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYRES32], @ANYBLOB="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", @ANYRESDEC, @ANYRES16=0x0, @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x180000000000000a, 0xffffffffffffff65, 0xfffffffffffffee8, &(0x7f0000000040)="e69ebf08bb64879e108847000000", 0x0, 0x69}, 0x28) 19:40:14 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x9effffff]}}}]}, 0x30}}, 0x0) [ 943.239555] IPVS: ftp: loaded support on port[0] = 21 19:40:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}}]}, 0x70}}, 0x0) 19:40:14 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf0ffff]}}}]}, 0x30}}, 0x0) 19:40:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x8, 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000df000000000000000200000058910800100000002bb71800f0ffffff06f00600010000009500000000000000187f0acb34f38cc05527f34866bc8725dd46bfc3529a4ec73b7b976ca8673e1c179f3e81f7dcac3d90878a8da675214e873bdf3bb51ebb576299e895b0c2653e6d2d02c7ff5f7f492df9668d9d6c90141a81d6689fa98154c95e4948e22ae6bca3e001708b1ffdb9681c776639c6f9ccdc4942065afdcdb767"], &(0x7f0000000080)='GPL\x00', 0x3ff, 0xee, &(0x7f0000000100)=""/238, 0x41f00, 0x0, [], 0x0, 0x9}, 0x48) 19:40:14 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x500]}}}]}, 0x30}}, 0x0) [ 943.804811] IPVS: ftp: loaded support on port[0] = 21 19:40:15 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x32a, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0x1, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0xfffffffffffffdf5) r1 = fcntl$getown(r0, 0x9) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffff9c, 0x10, &(0x7f00000002c0)={&(0x7f0000000400)=""/4096, 0x1000, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r2, 0x4) openat$vhci(0xffffffffffffff9c, &(0x7f0000001400)='/dev/vhci\x00', 0x240002, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x931, 0x80501) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000100)={0xa, 0x0, [{0x6, 0x1, 0x3, 0x80, 0xffffffff}, {0x7, 0x400, 0xc8, 0xe2, 0x8}, {0xc0000000, 0x10002000000000, 0x0, 0x2, 0x1}, {0x40000002, 0x10000, 0x20, 0x4, 0x80000001}, {0x80000008, 0x808000000000, 0x43f, 0x8, 0x5f6e}, {0x1, 0x8000, 0xfffffffffffffe01, 0x8001, 0xb59}, {0x80000007, 0x7, 0xf0c, 0x812, 0x9}, {0x80000008, 0x607, 0x1, 0x0, 0x2}, {0xc0000000, 0x2000000000, 0xffffffffffff9b86, 0x3, 0x6}, {0xc0000007, 0xfb8d, 0x5e4, 0x1, 0x40}]}) bind$tipc(r3, &(0x7f0000000280)=@id={0x1e, 0x3, 0x2, {0x4e21, 0x705}}, 0x10) getpgid(r1) 19:40:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}]}, 0x70}}, 0x0) 19:40:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}]}, 0x30}}, 0x0) 19:40:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20000, 0x0) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000040)={0x2, 0x8001}) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf0ffffff00000000]}}}]}, 0x30}}, 0x0) 19:40:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) r1 = msgget(0x3, 0x8) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000280)=""/169) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xfefb, 0x1ce, &(0x7f0000000040)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x25e) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x101280, 0x0) write$P9_RCLUNK(r2, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x40000) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000100)={{0x2, 0x4e20}, {0x1, @remote}, 0x30, {0x2, 0x4e23, @multicast2}, 'lo\x00'}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40000, 0x0) [ 944.373099] IPVS: ftp: loaded support on port[0] = 21 19:40:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}}]}, 0x70}}, 0x0) 19:40:15 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}}}]}, 0x30}}, 0x0) 19:40:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x7}, 0x28) epoll_create1(0x80000) 19:40:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}}]}, 0x70}}, 0x0) [ 945.257215] IPVS: ftp: loaded support on port[0] = 21 19:40:16 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x10800, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b77a0a0000000000bfa30000007f98559700000107030000007a0a65fff8ffffff79a4f0ff00000000b7060000ffffffff2d01800000000000006504040001000000040400000108000000030000000000006a0a00fe00000000060000000d000000b700400000000000950000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x180000000000000a, 0xe, 0x16b, &(0x7f0000000040)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x10000000]}}}]}, 0x30}}, 0x0) 19:40:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]}}}]}, 0x70}}, 0x0) 19:40:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x80, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)='securityselinuxvboxnet1vboxnet1(\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000240)={{0x9, 0x0, 0x2, 0x4}, 0x3, 0x30, 0x8, r1, 0x3, 0x6, 'syz0\x00', &(0x7f00000001c0)=['>nodev\x00', '/dev/rfkill\x00', '/dev/ppp\x00'], 0x1c, [], [0x10000, 0x6, 0x3, 0x400]}) r2 = socket$inet6(0xa, 0x803, 0x5) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xd0ee) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x80, 0x0) 19:40:16 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x1100000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 945.885110] kauditd_printk_skb: 8 callbacks suppressed [ 945.885125] audit: type=1326 audit(1545075616.705:958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5026 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="b70200000800a1656dfbcb74f11b00000703000000fefdff7a0af0fff8ffffff79a4f0ff0000005b00060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fea91e0000850000000d000000b7000000000000009500000000008000000000000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L-', 0x60}, 0x28, 0x3) pipe(&(0x7f0000000180)) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4606010909f12300000000000003003e00010000007f010000380000007903000009000000018020000100ea0403000000000000000600000000100000ffffffff050000008100000080000000020000000300000030af9ff2a34958bd5b4ade3cda66bd26f0c0e24fe7e3046adb96f7d7d11a57690079c2b6c2e37fc9164c72b91cbdff8b874cd25b65f46b77c895db4ca7f2665b01982ef9d481d3bea147c078a9487902946d121e064999841c4da02eff71548c76de3ca8c72625e9d8f5c5f1d66057af91544e14000000000000000058f2f36ec72b3a596c487c49cb781105e9f48552f07b3b2dcca5ba3c5de9240685f5a73f6dd289713d36011f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x201) 19:40:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}]}, 0x70}}, 0x0) 19:40:16 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}]}, 0x30}}, 0x0) [ 945.963319] audit: type=1326 audit(1545075616.755:959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5029 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 946.043132] IPVS: ftp: loaded support on port[0] = 21 19:40:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000a76504040001000000040400c101007d74b7030028000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], 0x0}, 0x48) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x200, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x24, r2, 0x200, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x4a}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040084) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bcsh0\x00', 0x0}) connect$packet(r0, &(0x7f0000000080)={0x11, 0x1f, r3, 0x1, 0x8234}, 0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}}}]}, 0x30}}, 0x0) 19:40:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}}]}, 0x70}}, 0x0) 19:40:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x321000, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)={0x18f, {{0xa, 0x4e21, 0x1, @local, 0x8000}}, 0x0, 0x3, [{{0xa, 0x4e24, 0xfffffffffffffff9, @local, 0xa80}}, {{0xa, 0x4e22, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}, 0x5}}, {{0xa, 0x4e23, 0x5, @local, 0x1}}]}, 0x210) 19:40:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}]}, 0x30}}, 0x0) 19:40:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 946.674297] audit: type=1326 audit(1545075617.495:960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5026 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 946.677748] IPVS: ftp: loaded support on port[0] = 21 [ 946.733107] audit: type=1326 audit(1545075617.555:961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5029 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) socket$packet(0x11, 0x2, 0x300) r0 = socket$inet6(0xa, 0x803, 0x5) setsockopt$inet6_dccp_int(r0, 0x21, 0x17, &(0x7f00000000c0)=0x4, 0x4) prctl$PR_GET_NAME(0x10, &(0x7f0000000000)=""/176) ioctl(r0, 0x5, &(0x7f0000000140)="0a5c2d023c126285718070") [ 946.851047] audit: type=1326 audit(1545075617.675:962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5076 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:18 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xf403000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}}]}, 0x70}}, 0x0) 19:40:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}}}]}, 0x30}}, 0x0) 19:40:18 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 947.219038] audit: type=1326 audit(1545075618.035:963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5080 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:18 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x311000) write$selinux_user(r0, &(0x7f0000000100)={'system_u:object_r:sulogin_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2d) modify_ldt$write2(0x11, &(0x7f0000000040)={0xfffffffeffffffff, 0xffffffffffffffff, 0x1000, 0x5, 0x7, 0xffffffffffffffff, 0x10001, 0x7, 0x3, 0x3ff}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}}}]}, 0x30}}, 0x0) [ 947.319521] IPVS: ftp: loaded support on port[0] = 21 19:40:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_ifreq(r0, 0xf78116b526440985, &(0x7f0000000040)={'bcsf0\x00', @ifru_flags=0x800}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}}]}, 0x70}}, 0x0) 19:40:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}}}]}, 0x30}}, 0x0) 19:40:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4fdff00000000b7060000ffffffff2d6405000001007d60b7030000000000006a0a00fe0000000085000000000095000000000000000000000005000000000000000000000000000000"], 0x0}, 0x48) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x6, 0x5, 0xc6c}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xfffffc1c, 0x0, &(0x7f0000000000)="c40703e69ebf08bb64879e188847", 0x0, 0x69}, 0x28) [ 947.652779] audit: type=1326 audit(1545075618.475:964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5076 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 947.755233] IPVS: ftp: loaded support on port[0] = 21 19:40:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}}]}, 0x70}}, 0x0) [ 947.990583] audit: type=1326 audit(1545075618.815:965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5080 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:18 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x1100, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:18 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}]}, 0x30}}, 0x0) 19:40:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x806, 0x5) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x200200, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000100)=0x4, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101040, 0x164) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x5) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x1f, 0x8000000000000, 0x1787215b, 0x4}, {0x7000000000000, 0x2, 0x1, 0x5}]}, 0x10) 19:40:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff78a4b11ee6d5e0f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000000007d60b7030000000000006a0a00fad5ad4e129109c94bbec69114e2fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000280)="61be80cc8ac6eca5f464fbc1951a63f9b9fc94f37e559212ce39fbde7ab794c46c69634292b08684aa1067477b082bbf0e656de6243ee9e840f1a8e344ec79aeb92715f6d9ed8fbd133a485fa5bbfeaa7cd3fa63dbb06aaaebcb0c98c29b856ec17ba195c354f510faf4b890b404eeb6be564b68266cf89651ce6ce5743f17b37c7b758f405333125b8e97d3ed763554862f84912864ba759776d8fb225952696aa8ad29b075002745f32d2a8c487a95a3d3364de600d77413d3db7046773cb7b7f943909d6129d22a905a8ef536e14151138be3ae66662b6f2c7c400e7d", &(0x7f0000000040)=""/59}, 0x18) 19:40:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}]}, 0x70}}, 0x0) 19:40:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 948.154976] audit: type=1326 audit(1545075618.975:966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5123 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 948.245899] IPVS: ftp: loaded support on port[0] = 21 19:40:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}}]}, 0x30}}, 0x0) 19:40:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(r0, &(0x7f0000003840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003880)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000038c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000003900)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000003940)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000003a40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f00000040c0)={@local, 0x0}, &(0x7f0000004100)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004180)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@remote}}, &(0x7f0000004280)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000042c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000004400)={0x11, 0x0, 0x0}, &(0x7f0000004440)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000004600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004640)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000004680)={@multicast1, @broadcast, 0x0}, &(0x7f00000046c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000004700)={@empty, 0x0}, &(0x7f0000004740)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000004780)={@dev, @multicast1, 0x0}, &(0x7f00000047c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004800)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000004900)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000004980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000049c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000004a00)={@dev, 0x0}, &(0x7f0000004a40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000004a80)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000004b80)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000006980)={0x0, @multicast1, @multicast2}, &(0x7f00000069c0)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000006a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006a40)=0x14, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f0000007dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007e00)=0x14) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000008440)={&(0x7f0000007e40)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000008380)=[{&(0x7f0000007ec0)=""/35, 0x23}, {&(0x7f0000007f00)=""/248, 0xf8}, {&(0x7f0000008000)=""/47, 0x2f}, {&(0x7f0000008040)=""/247, 0xf7}, {&(0x7f0000008140)=""/133, 0x85}, {&(0x7f0000008200)=""/34, 0x22}, {&(0x7f0000008240)}, {&(0x7f0000008280)=""/205, 0xcd}], 0x8, &(0x7f0000008400)=""/2, 0x2}, 0x2021) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000008900)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000008a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008a40)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000008b40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000c2c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000c300)=0x14) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000cb40)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f000000cb00)={&(0x7f000000c340)={0x7c0, r2, 0x4, 0x70bd26, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0xc8, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r5}, {0x1ec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r7}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xd489}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r11}, {0x74, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}]}}, {{0x8, 0x1, r13}, {0x44, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r14}, {0x174, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x200}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x400}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r16}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8001}}, {0x8}}}]}}, {{0x8, 0x1, r17}, {0xf8, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r19}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xc99}}, {0x8}}}]}}, {{0x8, 0x1, r20}, {0x19c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1000000}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}]}}]}, 0x7c0}, 0x1, 0x0, 0x0, 0x20000000}, 0x80c4) [ 948.272112] audit: type=1326 audit(1545075619.005:967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5124 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}]}, 0x70}}, 0x0) 19:40:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfcffffff]}}}]}, 0x30}}, 0x0) 19:40:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}]}, 0x70}}, 0x0) [ 948.778506] IPVS: ftp: loaded support on port[0] = 21 19:40:19 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x15a, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf0]}}}]}, 0x30}}, 0x0) 19:40:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}]}, 0x70}}, 0x0) 19:40:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x2, &(0x7f00000003c0)=ANY=[@ANYRESDEC], 0x0, 0x8, 0x0, 0x0, 0x41003, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x200, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000380)={@broadcast, @local, 0x1, 0x2, [@broadcast, @dev={0xac, 0x14, 0x14, 0x14}]}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x20}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xd3, 0x495, &(0x7f0000000100)="7fc6dba3dcffce2f399f14cafdb87ff6c5c7d42402dc6d9e66bc88e73b78a87bbf67bdc8a06011685c93f3c70217824ac44268f9bc35475b40e44709590e0836fbcd14e3f48f6e8f775ba8de51f946beb9806b00df253d4f03dcc8f10e0e51193c48e709bcf4e367143e6b71e550bc25464a34d3c9e49855456573ab4bc8d72493651fd3560477ab8226700c52b1027eb69db978b18e246ae58e0bc782e3c10a427db6daa2ae7b5df7e5d708b3e22cc386242d6a45a5fdf053ff4155397dac060d0e786d2747f0b806efb878525088c136d427", &(0x7f0000000200)=""/206, 0x64}, 0xfed0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) 19:40:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) sendto$inet6(r0, &(0x7f0000000240)="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", 0xfc, 0x40000, &(0x7f0000000100)={0xa, 0x4e23, 0xbcd6, @local, 0xb8}, 0x1c) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000340)={r0, 0x1f, 0x80, "150a9eea64ec273a70aa0f23c4f355e5a03b4680d14c5023cf2e1fad01602c45df0c2bdc29b4c1ab56e11f9fdeebd3f5bfd06ca7db50c25aa0e20f24351367c4732ae491d5cf4621a1f7a1e5a85b7fa084e1ccd362eb78cdd91d1f6528ecbccb3923392f1863cefb8fc642fb0e222a88560b2221c128e5540138955efe6fe7bf4eb78cdd28976f8ee2e66eced0c6e33f0d20d43172a527f0acf87d4265acd2be093c957ee6ac91f4ff606acda43fd9ca4d1bcc2d46fab7cf9fb43131"}) r1 = msgget(0x0, 0x100) msgrcv(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001160000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020"], 0x96, 0x3, 0x3800) socket$inet6(0xa, 0x4, 0x20000000005) msgget(0x1, 0x320) 19:40:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0x1e0, 0x0, &(0x7f0000000040)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) 19:40:20 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]}}}]}, 0x30}}, 0x0) [ 949.238631] IPVS: ftp: loaded support on port[0] = 21 19:40:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]}}}]}, 0x70}}, 0x0) 19:40:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x8, 0x5) r1 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r1, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) r2 = dup3(r0, r0, 0x80000) getsockopt$netlink(r2, 0x10e, 0xd, &(0x7f0000000000)=""/73, &(0x7f0000000080)=0x49) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x40, 0x400000) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000080)={0x57, 0xb82, 0x4, {0x5, 0xb8}, {0x80000001, 0x67f4}, @rumble={0x7fffffff, 0x8000}}) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:20 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}}]}, 0x30}}, 0x0) [ 949.776077] IPVS: ftp: loaded support on port[0] = 21 19:40:21 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x2b4, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x180000000000000a, 0xe, 0xffffffffffffff9d, &(0x7f0000000100)="0100ffffffffffff64879e108847", 0x0, 0x69}, 0x28) 19:40:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}}}]}, 0x30}}, 0x0) 19:40:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}]}, 0x70}}, 0x0) 19:40:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x280000, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000040)={0x4991, 0x1, 0x0, 0x1, 0x5, 0xf1, 0xd726, 0x7ff, 0xfffffffffffffffd, 0x8000}) 19:40:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xf, 0x0, &(0x7f0000000040)="b90703e69ebf08c42c64879e108847", 0x0, 0x69}, 0x28) 19:40:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}}]}, 0x30}}, 0x0) [ 950.395225] IPVS: ftp: loaded support on port[0] = 21 19:40:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}}]}, 0x70}}, 0x0) 19:40:21 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/242, &(0x7f0000000080)=0xf2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:21 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0]}}}]}, 0x30}}, 0x0) 19:40:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) r1 = semget(0x1, 0x5, 0x0) semctl$IPC_INFO(r1, 0x0, 0x3, &(0x7f0000000100)=""/138) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 950.946850] IPVS: ftp: loaded support on port[0] = 21 [ 951.078231] kauditd_printk_skb: 9 callbacks suppressed [ 951.078253] audit: type=1326 audit(1545075621.895:977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5225 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 951.229366] audit: type=1326 audit(1545075622.045:978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5240 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}}}]}, 0x30}}, 0x0) 19:40:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff]}}}]}, 0x70}}, 0x0) 19:40:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20000199, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000080151a239a30000000000000703000000feffff7a0af0fff8ffffff79a4f2ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0400fe000000001a5f199c06005a452485000000"], 0x0, 0x4000000000000}, 0x48) socket$netlink(0x10, 0x3, 0xf) 19:40:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:22 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xda020000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 951.399075] audit: type=1326 audit(1545075622.215:979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5269 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 951.469317] IPVS: ftp: loaded support on port[0] = 21 19:40:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000000000000006a0a00fe00000000850000000d000000b7009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000840)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000080)={0xc, 0x8, 0xfa00, {&(0x7f0000000440)}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r2}}, 0x48) r3 = socket$inet_udp(0x2, 0x2, 0x0) shutdown(r3, 0x0) [ 951.504278] audit: type=1326 audit(1545075622.285:980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5271 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000]}}}]}, 0x30}}, 0x0) 19:40:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}}]}, 0x70}}, 0x0) 19:40:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}}]}, 0x30}}, 0x0) 19:40:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}]}, 0x70}}, 0x0) 19:40:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) memfd_create(&(0x7f0000000080)='\x00', 0x1) 19:40:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}}}]}, 0x30}}, 0x0) 19:40:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}}]}, 0x70}}, 0x0) [ 952.195673] audit: type=1326 audit(1545075623.015:981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5269 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 952.238433] IPVS: ftp: loaded support on port[0] = 21 19:40:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 952.260146] audit: type=1326 audit(1545075623.075:982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5271 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 952.341141] audit: type=1326 audit(1545075623.165:983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5321 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:23 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x58, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}]}, 0x30}}, 0x0) 19:40:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2000008b, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0900000000000000a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000003dab7e27a9521a4b749d08fe3184cf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:23 executing program 3: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000340)=[@in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}, @in6={0xa, 0x4e22, 0x1ff, @loopback, 0x3}, @in6={0xa, 0x4e24, 0x100000000, @local}, @in6={0xa, 0x4e20, 0x1, @ipv4={[], [], @remote}}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e22, 0x1ff, @dev={0xfe, 0x80, [], 0x20}, 0x8}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e20, 0x6, @local, 0x9ff3088}], 0xcc) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{}, {r1, r2+10000000}}, &(0x7f00000000c0)) seccomp(0x1, 0xfffffffffffffffc, &(0x7f0000000100)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x7ff, 0x400000081}]}) r3 = socket$inet6(0xa, 0x5, 0x9f) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") write$P9_RREAD(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="d7000000750200cc000000c6d64b0ecc987a8a4cb7014efb71a379268ba053f5278851e9e357fb8ac082971328313000ee9a14e73d2543314e1aa533e881ad5de1238811f158a0759d9629819d0b21a85f3fd5489e90d3e585fe9318804bfa831b3467e7c8562597c6da9f5386f2deac978f0800dfa39eedfc7324c1aa60f156e0bccc34cdfaa82be6c2b790e38de804f5ecb2faba02000000efd22df77c2fb4fcaa28aa25108fe8fe4ee3ca039173b78f169475e68cc9b3d527a1c248c02525fae3009ed0fb6a92fb95e73c9988fd7d03c78ee1bec070"], 0xd7) 19:40:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}]}, 0x70}}, 0x0) 19:40:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x2a02000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfcffffff00000000]}}}]}, 0x30}}, 0x0) 19:40:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}]}, 0x70}}, 0x0) 19:40:23 executing program 3: seccomp(0x1, 0x4, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x4, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x0, 0x9) ioctl(r0, 0x3aa271b5, &(0x7f0000000280)="0a5c48023c1262857181708b9bdcedb3fe2c8a0832f897ef27779874dc36272913416a2113ba3a876875f780c2bddd74666fc8a392a6e54b8530b1d25b1e3eb09eb74e4a9798de6de93d7f85894741c7c30fce642e1554be36329f969e8126ea400078793e17a5e6f809215079a82c0e6fb5db4fac8f16c6126024601e7fa75140d7ac9997de68e9ecbeabfede9f42759ab4ff000000630eb482690c70ec8be9c7ca5f852072cee337a3a6ce0992ff270f76520214996036051c8ee2914e610d84232b465abd14e7e24449a7212b64d97e6bc72e0a0298") r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x100, 0x10000, 0x2, 0x10001, 0x0, 0x3, 0x800, 0x8, 0x100000001, 0x8, 0x400, 0x0, 0x7ff, 0x7, 0x1f, 0x8000, 0x9, 0x1, 0x5, 0x400, 0x8444, 0x400, 0x3fffc0, 0x1ff, 0xaa7, 0x5827, 0x3, 0x581, 0x0, 0x6, 0x8000, 0x6, 0x2, 0x100000000, 0x7fff, 0x1434, 0x0, 0x3f, 0x1, @perf_bp={&(0x7f0000000040), 0x4}, 0x4000, 0x5, 0x5fed, 0x2, 0x4742, 0x6, 0x7}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x7) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)={0x0, 0xcf3, 0x1, [0x1f]}, &(0x7f0000000140)=0xa) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000001c0)={r2, 0x8}, 0x8) [ 952.943458] IPVS: ftp: loaded support on port[0] = 21 [ 952.987388] IPVS: ftp: loaded support on port[0] = 21 19:40:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1300000000000000]}}}]}, 0x30}}, 0x0) [ 953.143649] audit: type=1326 audit(1545075623.965:984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5321 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}}]}, 0x70}}, 0x0) 19:40:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 953.424271] audit: type=1326 audit(1545075624.245:985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5370 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 953.761006] IPVS: ftp: loaded support on port[0] = 21 19:40:25 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x1a0ffffffff, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000040)={0xf000, 0x11000}) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r1 = socket$inet6(0xa, 0x803, 0x5) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:25 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}]}, 0x30}}, 0x0) 19:40:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff]}}}]}, 0x70}}, 0x0) 19:40:25 executing program 0 (fault-call:2 fault-nth:0): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 954.241814] audit: type=1326 audit(1545075625.065:986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5370 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:25 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff]}}}]}, 0x30}}, 0x0) 19:40:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}}]}, 0x70}}, 0x0) [ 954.387261] IPVS: ftp: loaded support on port[0] = 21 19:40:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:25 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}}}]}, 0x30}}, 0x0) 19:40:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}]}, 0x70}}, 0x0) [ 954.851326] IPVS: ftp: loaded support on port[0] = 21 19:40:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xe2030000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff]}}}]}, 0x30}}, 0x0) 19:40:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000]}}}]}, 0x70}}, 0x0) 19:40:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000208912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200240, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x40000000000, 0x0, 0x10003, 0x40}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000080)={r2, 0x8000}) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000380)=ANY=[@ANYBLOB="030000000000000000601000000000002100000000000000", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000d00000000000008d00000000000000", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800007f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], @ANYBLOB="000000000000000000100000000000007d00000000000000", @ANYPTR=&(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) [ 955.331161] IPVS: ftp: loaded support on port[0] = 21 19:40:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x110]}}}]}, 0x30}}, 0x0) 19:40:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}}]}, 0x70}}, 0x0) 19:40:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc]}}}]}, 0x30}}, 0x0) 19:40:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}}]}, 0x30}}, 0x0) [ 955.848149] IPVS: ftp: loaded support on port[0] = 21 19:40:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}]}, 0x70}}, 0x0) 19:40:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x13000000]}}}]}, 0x30}}, 0x0) 19:40:27 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x2ac, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x80000003, &(0x7f0000000040)="edf14c4ccfee45c5aab8a1b86f8f270ed42c5c32a464560e399343cc3517600e476ac1ab8d46b3b00136a4f58c47a9ed7f6475851aaa54f67187ce222bcc0200a3b97760423dff9a0f4c8852c8eefef5323e3805e8ac482045c75b1e75987e2e6d26da6226a93556072a539f43a700f49521") syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000000c0)) [ 956.280501] kauditd_printk_skb: 7 callbacks suppressed [ 956.280516] audit: type=1326 audit(1545075627.095:994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5465 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 956.325626] audit: type=1326 audit(1545075627.135:995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5444 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 956.340882] IPVS: ftp: loaded support on port[0] = 21 19:40:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x16, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff]}}}]}, 0x30}}, 0x0) 19:40:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}}]}, 0x70}}, 0x0) 19:40:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}}]}, 0x30}}, 0x0) [ 956.543986] audit: type=1326 audit(1545075627.365:996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5484 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0x0 19:40:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}}]}, 0x70}}, 0x0) 19:40:27 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}}]}, 0x30}}, 0x0) 19:40:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 957.080817] audit: type=1326 audit(1545075627.905:997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5465 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 957.125001] IPVS: ftp: loaded support on port[0] = 21 [ 957.325256] audit: type=1326 audit(1545075628.145:998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5484 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0x0 19:40:28 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x3d2, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}}]}, 0x70}}, 0x0) 19:40:28 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1300]}}}]}, 0x30}}, 0x0) 19:40:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:28 executing program 3: socketpair(0x13, 0x6, 0x7fffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e22, 0x100000000, @dev={0xfe, 0x80, [], 0xc}, 0x10000}}, 0x275e}, &(0x7f00000001c0)=0x90) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000240)={r2, 0x80, 0x5, 0x80000001}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x0, 0x800, 0x4, 0x6, 0x0, 0x4, 0x100, 0xa, 0x5, 0x100, 0x7ff, 0x80000000, 0xfffffffffffffffe, 0x3, 0x6, 0x3, 0x0, 0x9, 0x8, 0x2, 0xd3, 0x7, 0x4, 0x2fe5, 0x2, 0x100000001, 0x2, 0x4769, 0x1, 0x8000, 0x10001, 0x6, 0x8, 0x5, 0x7, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000200)}, 0x0, 0xe4, 0x6f, 0xb, 0x81, 0x3ff, 0x3}, 0x0, 0x0, 0xffffffffffffff9c, 0x8) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x3) prctl$PR_GET_TIMERSLACK(0x1e) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCSMRU(r4, 0x40047452, &(0x7f0000000040)) r5 = socket$inet6(0xa, 0x803, 0x5) ioctl(r5, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x14, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:28 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}}}]}, 0x30}}, 0x0) [ 957.788088] IPVS: ftp: loaded support on port[0] = 21 19:40:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x87, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}]}, 0x70}}, 0x0) 19:40:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = shmget(0x3, 0x2000, 0x54000149, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000240)=""/221) r1 = socket$inet6(0xa, 0x803, 0x5) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/223) r2 = syz_open_dev$adsp(&(0x7f0000000340)='/dev/adsp#\x00', 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x8000, &(0x7f0000000540)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB="2c7766646e7f1de70e78aa6f8830eb9ad405ea30a7e40236c96aa0bc7b050f2c4eeafda3ff8e6ce22df0ad4c0afea450e1298d87d3ba79d6550650433741dadcfb6bd16d60697e7e6d4375190bc53173468be78f65ea19e2f26195c9e736ba7bb777c75d4f939532523dd5109b1e3a8123a50551ea133c", @ANYRESHEX=r1, @ANYBLOB=',debug=0x000000000000a2df,mmap,posixacl,cachetag=,cache=mmap,access=client,access=user,cache=mmap,\x00']) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000140)=0x6, 0x4) ioctl(r2, 0x4001000088912, &(0x7f00000004c0)="0a5c2d023c126285718070682fdc56f0da1c5e6a9b1f212b413a82088040455d9f27a3b82c751fe801c08fca95348fee7202cd7f7283bd6fe46c343382f65999f07b369a0d6798") socket$inet_tcp(0x2, 0x1, 0x0) eventfd(0x73a) 19:40:28 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}}}]}, 0x30}}, 0x0) [ 958.076339] audit: type=1326 audit(1545075628.895:999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5545 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 958.452170] IPVS: ftp: loaded support on port[0] = 21 19:40:29 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x2e8, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}}}]}, 0x30}}, 0x0) 19:40:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x15, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}}]}, 0x70}}, 0x0) [ 958.873410] audit: type=1326 audit(1545075629.695:1000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5545 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x5f8, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}}}]}, 0x30}}, 0x0) 19:40:29 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x140, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r1 = socket$inet6(0xa, 0x803, 0x5) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x8) 19:40:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}}]}, 0x70}}, 0x0) [ 959.096553] IPVS: ftp: loaded support on port[0] = 21 19:40:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x5c, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 959.226385] audit: type=1326 audit(1545075630.045:1001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5587 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 959.646941] IPVS: ftp: loaded support on port[0] = 21 [ 960.021629] audit: type=1326 audit(1545075630.845:1002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5587 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:30 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x2a020000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:30 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff00000000]}}}]}, 0x30}}, 0x0) 19:40:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}}]}, 0x70}}, 0x0) 19:40:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x84, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) recvmmsg(0xffffffffffffff9c, &(0x7f000000bd40)=[{{&(0x7f0000000000)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000080)=""/103, 0x67}, {&(0x7f0000000240)=""/72, 0x48}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/235, 0xeb}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/197, 0xc5}, {&(0x7f0000000100)=""/55, 0x37}], 0x7, &(0x7f0000002540)=""/89, 0x59}, 0x100000000000}, {{&(0x7f00000025c0)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000003640)=""/89, 0x59}, {&(0x7f00000036c0)=""/235, 0xeb}], 0x3}, 0x8}, {{&(0x7f00000037c0)=@ax25, 0x80, &(0x7f0000003980)=[{&(0x7f0000003840)=""/118, 0x76}, {&(0x7f00000038c0)=""/30, 0x1e}, {&(0x7f0000003900)=""/102, 0x66}], 0x3, &(0x7f00000039c0)=""/13, 0xd}, 0x8}, {{&(0x7f0000003a00)=@nl=@unspec, 0x80, &(0x7f0000005d00)=[{&(0x7f0000003a80)=""/143, 0x8f}, {&(0x7f0000003b40)=""/58, 0x3a}, {&(0x7f0000003b80)=""/175, 0xaf}, {&(0x7f0000003c40)=""/4096, 0x1000}, {&(0x7f0000004c40)=""/116, 0x74}, {&(0x7f0000004cc0)=""/4096, 0x1000}, {&(0x7f0000005cc0)=""/20, 0x14}], 0x7, &(0x7f0000005d80)=""/211, 0xd3}, 0x823}, {{&(0x7f0000005e80)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000006180)=[{&(0x7f0000005f00)=""/119, 0x77}, {&(0x7f0000005f80)=""/103, 0x67}, {&(0x7f0000006000)=""/34, 0x22}, {&(0x7f0000006040)=""/211, 0xd3}, {&(0x7f0000006140)=""/28, 0x1c}], 0x5, &(0x7f0000006200)=""/4096, 0x1000}, 0x80000000}, {{0x0, 0x0, &(0x7f0000009680)=[{&(0x7f0000007200)=""/63, 0x3f}, {&(0x7f0000007240)=""/84, 0x54}, {&(0x7f00000072c0)=""/4096, 0x1000}, {&(0x7f00000082c0)=""/37, 0x25}, {&(0x7f0000008300)=""/157, 0x9d}, {&(0x7f00000083c0)=""/4096, 0x1000}, {&(0x7f00000093c0)=""/154, 0x9a}, {&(0x7f0000009480)=""/82, 0x52}, {&(0x7f0000009500)=""/84, 0x54}, {&(0x7f0000009580)=""/214, 0xd6}], 0xa}, 0x2}, {{0x0, 0x0, &(0x7f000000a900)=[{&(0x7f0000009740)=""/125, 0x7d}, {&(0x7f00000097c0)=""/6, 0x6}, {&(0x7f0000009800)=""/245, 0xf5}, {&(0x7f0000009900)=""/4096, 0x1000}], 0x4, &(0x7f000000a940)=""/58, 0x3a}, 0x80000001}, {{&(0x7f000000a980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f000000bcc0)=[{&(0x7f000000aa00)=""/153, 0x99}, {&(0x7f000000aac0)=""/64, 0x40}, {&(0x7f000000ab00)=""/206, 0xce}, {&(0x7f000000ac00)=""/4096, 0x1000}, {&(0x7f000000bc00)=""/144, 0x90}], 0x5}, 0x100000000}], 0x8, 0x40000000, &(0x7f000000bf40)={0x0, 0x1c9c380}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f000000bf80), &(0x7f000000bfc0)=0x4) r1 = socket$inet6(0xa, 0x803, 0x5) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 960.218412] audit: type=1326 audit(1545075631.035:1003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5611 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0xc, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:31 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}}}]}, 0x30}}, 0x0) [ 960.328295] IPVS: ftp: loaded support on port[0] = 21 19:40:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}]}, 0x70}}, 0x0) 19:40:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:31 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}}]}, 0x30}}, 0x0) [ 960.910746] IPVS: ftp: loaded support on port[0] = 21 19:40:32 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x92030000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x2d, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}}]}, 0x70}}, 0x0) 19:40:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}}]}, 0x30}}, 0x0) 19:40:32 executing program 3: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') r1 = socket$inet6(0xa, 0x803, 0x5) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000040)=""/237, &(0x7f00000001c0)=0xed) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") creat(&(0x7f0000000240)='./file0\x00', 0x0) 19:40:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}}]}, 0x30}}, 0x0) 19:40:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x30, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 961.355562] kauditd_printk_skb: 1 callbacks suppressed [ 961.355579] audit: type=1326 audit(1545075632.175:1005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5654 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}]}, 0x70}}, 0x0) [ 961.447108] IPVS: ftp: loaded support on port[0] = 21 19:40:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000]}}}]}, 0x30}}, 0x0) 19:40:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000f, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 961.882339] IPVS: ftp: loaded support on port[0] = 21 [ 962.139832] audit: type=1326 audit(1545075632.955:1006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5654 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:33 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xd8, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0xac, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]}}}]}, 0x70}}, 0x0) 19:40:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}}]}, 0x30}}, 0x0) 19:40:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000005, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x3, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000e, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 962.284359] audit: type=1326 audit(1545075633.105:1007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5697 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}}]}, 0x70}}, 0x0) 19:40:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff]}}}]}, 0x30}}, 0x0) [ 962.408811] IPVS: ftp: loaded support on port[0] = 21 19:40:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000013, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x7, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}}]}, 0x30}}, 0x0) [ 962.849158] IPVS: ftp: loaded support on port[0] = 21 [ 963.050645] audit: type=1326 audit(1545075633.875:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5697 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:33 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x392, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}}]}, 0x70}}, 0x0) 19:40:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000012, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x7c, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}}}]}, 0x30}}, 0x0) 19:40:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs_stats\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x86, 0x61, &(0x7f0000000240)="2cb4348eee0295702ae3037fdbfefdd8b5acd6d2585229fd0a0311d8e44203f76e13df10ce0b95b578aeb870416e2fa02a986ccaff24343203f8e8d15c35ddda82903761e512021c9e816231f2f2a2eb4a497c2368244dd9c00d7e5861ca3bf8d103e5f6fa585b5834eddd9a1f104aa4227bede3f718a8caac656664678768af1a944c40e580", &(0x7f0000000100)=""/97, 0x1}, 0x28) ioctl(r0, 0x1000008912, &(0x7f0000000080)="86ea2230629b170000c4c5bf038593098883dc11f1ba58d26df54d8dcfc326a501c8782be40a451f157c71e43a662f588d9fa29c5b7a927dcecffaaa2c7b1dc52295cb30") [ 963.170954] audit: type=1326 audit(1545075633.995:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5738 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:34 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}}]}, 0x30}}, 0x0) 19:40:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000004, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 963.247169] IPVS: ftp: loaded support on port[0] = 21 19:40:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0xb1, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}]}, 0x70}}, 0x0) 19:40:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000c, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:34 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}}]}, 0x30}}, 0x0) [ 963.816329] IPVS: ftp: loaded support on port[0] = 21 [ 963.969344] audit: type=1326 audit(1545075634.785:1010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5738 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:35 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x198, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x480, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000010, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:35 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}]}, 0x30}}, 0x0) 19:40:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}}]}, 0x70}}, 0x0) 19:40:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x7fe0000000, 0x30, 0xbf, 0x1c0}, &(0x7f0000000040)=0x18) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={r1, 0x6}, 0x8) 19:40:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x61, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000002, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 964.345354] audit: type=1326 audit(1545075635.165:1011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5784 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:35 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}]}, 0x30}}, 0x0) [ 964.436507] IPVS: ftp: loaded support on port[0] = 21 19:40:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}}]}, 0x70}}, 0x0) 19:40:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000015, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:35 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000]}}}]}, 0x30}}, 0x0) [ 964.955920] IPVS: ftp: loaded support on port[0] = 21 [ 965.122851] audit: type=1326 audit(1545075635.945:1012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5784 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:36 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x1800000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x9c, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}}}]}, 0x30}}, 0x0) 19:40:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000003, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x8}}}]}, 0x70}}, 0x0) 19:40:36 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) sync_file_range(r0, 0x1f, 0xd9, 0x2) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000040)={0x100, "be21cbc784dfd2b721eace1d7644f801571e24227752e06d196e9d3a69972f32", 0x5, 0x0, 0x8, 0x3f, 0x0, 0x0, 0x6, 0x4}) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) fsetxattr$security_selinux(r0, &(0x7f0000000100)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:mount_tmp_t:s0\x00', 0x21, 0x0) r1 = socket$inet6(0xa, 0x803, 0x5) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) 19:40:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x180, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 965.446000] audit: type=1326 audit(1545075636.265:1013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5828 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}}}]}, 0x30}}, 0x0) 19:40:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000008, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 965.563695] IPVS: ftp: loaded support on port[0] = 21 19:40:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x18}}}]}, 0x70}}, 0x0) 19:40:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x2, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}]}, 0x30}}, 0x0) [ 966.152845] IPVS: ftp: loaded support on port[0] = 21 [ 966.221265] audit: type=1326 audit(1545075637.045:1014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5828 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:37 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xe603000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000d, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x64, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1200]}}}]}, 0x30}}, 0x0) 19:40:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0xffffff1f}}}]}, 0x70}}, 0x0) 19:40:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40100, 0x0) r2 = shmget$private(0x0, 0x1000, 0x54000500, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_LOCK(r2, 0xb) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000980)={0x0, @loopback, @empty}, &(0x7f00000009c0)=0xc) sendto$packet(r1, &(0x7f0000000040)="de835e16c8cfcd726b70f20439c5ce23574f7c8a49388ed9fe40fc20cded719f370126ba7ff705b4d16908f5a1fdc8fa5b35ec07f4ba7906c36d5981da186c5b46b1ea9f1ee74e6b6b27d391ee119af8219ea3f9992c457fdeb926eca14d14ce52ceb21c4449b9c6959761a6bc97d6ca6a8273997293e0ba3b21eaaa0ba597a1d71e4bc2796ab0a4c3ac4d6e02031abc0141fc3b09b704dcb22dabfa2ff25fd4c770a75fe5bc0188e1e1ca8662c3b5", 0xaf, 0x80, &(0x7f0000000a00)={0x11, 0xf7, r3, 0x1, 0x1a}, 0x14) 19:40:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x54, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000007, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 966.665261] audit: type=1326 audit(1545075637.485:1015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5875 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}]}, 0x30}}, 0x0) 19:40:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x300}}}]}, 0x70}}, 0x0) [ 966.800088] IPVS: ftp: loaded support on port[0] = 21 19:40:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000014, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x1c, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 967.268733] IPVS: ftp: loaded support on port[0] = 21 [ 967.461232] audit: type=1326 audit(1545075638.285:1016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5875 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:38 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x5e030000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}}}]}, 0x30}}, 0x0) 19:40:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000009, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1a}}}]}, 0x70}}, 0x0) 19:40:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x4d, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000240)={{0x0, 0x5, 0x8, 0x9, 'syz1\x00', 0x8}, 0x3, 0x4, 0x3ff, r2, 0x5, 0x4276, 'syz0\x00', &(0x7f00000001c0)=['\x00', 'trusted\x00', '/dev/audio\x00', '/dev/audio\x00', '--\x00'], 0x22, [], [0x1d53, 0x3, 0x6, 0x1]}) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xb) r4 = msgget(0x0, 0x4) msgctl$MSG_INFO(r4, 0xc, &(0x7f0000000380)=""/83) syz_open_dev$midi(&(0x7f0000000400)='/dev/midi#\x00', 0x7, 0x0) [ 967.784124] audit: type=1326 audit(1545075638.605:1017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5917 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}}]}, 0x30}}, 0x0) 19:40:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000b, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 967.828799] IPVS: ftp: loaded support on port[0] = 21 19:40:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x2}}}]}, 0x70}}, 0x0) 19:40:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x4, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}]}, 0x30}}, 0x0) 19:40:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 968.347377] IPVS: ftp: loaded support on port[0] = 21 [ 968.552098] audit: type=1326 audit(1545075639.375:1018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5917 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:39 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x9800, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x45, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0xffffff80}}]}, 0x70}}, 0x0) 19:40:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}]}, 0x30}}, 0x0) 19:40:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000011, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:39 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1ff, 0xa8000) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040), 0x10) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r1 = socket$inet6(0xa, 0x803, 0x5) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x100000000000000, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 968.777418] audit: type=1326 audit(1545075639.595:1019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5959 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x28, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}}]}, 0x30}}, 0x0) [ 968.852398] IPVS: ftp: loaded support on port[0] = 21 19:40:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x400000000000000}}]}, 0x70}}, 0x0) 19:40:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x1000000, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}}]}, 0x30}}, 0x0) [ 969.368350] IPVS: ftp: loaded support on port[0] = 21 [ 969.542484] audit: type=1326 audit(1545075640.365:1020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5959 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:40 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x144, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x66b, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69, 0x100000000000000}, 0x28) 19:40:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000]}}}]}, 0x30}}, 0x0) 19:40:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0xffffff7f00000000}}]}, 0x70}}, 0x0) 19:40:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 19:40:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}}]}, 0x30}}, 0x0) 19:40:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69, 0x1000000}, 0x28) [ 969.741246] audit: type=1326 audit(1545075640.565:1021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6004 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x48, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x100000000000000}}]}, 0x70}}, 0x0) [ 969.853153] IPVS: ftp: loaded support on port[0] = 21 19:40:40 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}}]}, 0x30}}, 0x0) 19:40:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x48) [ 970.355555] IPVS: ftp: loaded support on port[0] = 21 [ 970.520837] audit: type=1326 audit(1545075641.345:1022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6004 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:41 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x5403000000000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x3, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}]}, 0x30}}, 0x0) 19:40:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x80ffffff}}]}, 0x70}}, 0x0) 19:40:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x200000e8) 19:40:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x100, 0x0) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000040)=0x3, &(0x7f0000000080)=0x2) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000000c0)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, r1, 0x0, 0xe, &(0x7f0000000100)='eth1cpusetem1\x00', 0xffffffffffffffff}, 0x30) tgkill(r2, r3, 0x3c) [ 970.892478] audit: type=1326 audit(1545075641.715:1023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6044 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f0000000080)={0x7fffffff, 0x0, 0x2019, 0x8e25, 0x3ff, {0x9, 0x7}, 0x1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x2c, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 970.953904] IPVS: ftp: loaded support on port[0] = 21 19:40:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff]}}}]}, 0x30}}, 0x0) 19:40:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x400300}}]}, 0x70}}, 0x0) 19:40:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9e]}}}]}, 0x30}}, 0x0) [ 971.501196] IPVS: ftp: loaded support on port[0] = 21 [ 971.652240] audit: type=1326 audit(1545075642.475:1024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6044 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:42 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x98000000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x7ff, 0x40800) socket$bt_rfcomm(0x1f, 0xfffffffffffffffd, 0x3) 19:40:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x60, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x3f000000}}]}, 0x70}}, 0x0) 19:40:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1001000000000000]}}}]}, 0x30}}, 0x0) 19:40:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x800, 0xa) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 972.011515] audit: type=1326 audit(1545075642.835:1025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6089 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:42 executing program 0: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000100)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f0000000080)=0xe8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x8, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r0}, 0xfffffffffffffde2) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x5d5, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}]}, 0x30}}, 0x0) 19:40:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x80) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000280)) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000100)={0x5, 0x3, [{0x7, 0x0, 0x8}, {0x297, 0x0, 0xfffffffffffffffa}, {0x80}, {0x2, 0x0, 0x600000000000}, {0x6, 0x0, 0x1000}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x5}, 0x0) [ 972.163149] IPVS: ftp: loaded support on port[0] = 21 19:40:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x10}}]}, 0x70}}, 0x0) 19:40:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x5, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 972.658156] IPVS: ftp: loaded support on port[0] = 21 [ 972.808115] audit: type=1326 audit(1545075643.625:1026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6089 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:43 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x44010000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10010000]}}}]}, 0x30}}, 0x0) 19:40:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) poll(&(0x7f0000000180)=[{r0, 0x124}, {r0, 0x80}, {r0, 0x100}, {r0, 0x8000}, {r0, 0x200}, {r0, 0x2001}, {r0, 0x20}], 0x7, 0x9) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000100)={{0x80000000, 0x9}, {0x9, 0x4}, 0x0, 0x5, 0x7}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x3, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000340)=0xe8) fstat(r1, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000300)='./file0\x00', r3, r4) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000002c0)=0x2) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000280)={'bridge0\x00', 0x7fffffff}) 19:40:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x80ffffff00000000}}]}, 0x70}}, 0x0) 19:40:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x4c, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) fstatfs(r0, &(0x7f0000000400)=""/212) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/rt_cache\x00') getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000180)={r2, 0xf, "a13ea9b82c1ab62322c636b90bc3da"}, &(0x7f0000000280)=0xffffffffffffff27) [ 973.137304] audit: type=1326 audit(1545075643.955:1027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6145 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000]}}}]}, 0x30}}, 0x0) 19:40:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x1d, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x40030000000000}}]}, 0x70}}, 0x0) [ 973.272524] IPVS: ftp: loaded support on port[0] = 21 19:40:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000080)=@tipc, &(0x7f0000000000)=0x80, 0x80000) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000100)={'HL\x00'}, &(0x7f0000000140)=0x1e) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) 19:40:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}}}]}, 0x30}}, 0x0) [ 973.835747] IPVS: ftp: loaded support on port[0] = 21 [ 973.938470] audit: type=1326 audit(1545075644.755:1028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6145 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:45 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x2a010000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}}]}, 0x30}}, 0x0) 19:40:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x35, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000098de5010d18235c6ee91ef9c35b10b00feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r1 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x0, 0x14100) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000280)={'bond_slave_1\x00'}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x84, r2, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bridge\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xd}}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') socket$inet6_dccp(0xa, 0x6, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffff9c, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="68010000", @ANYRES16=r3, @ANYBLOB="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"], 0x168}}, 0x4000804) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000540)=0x20) write$P9_RWRITE(r1, &(0x7f00000002c0)={0xb, 0x77, 0x1, 0x2}, 0xb) 19:40:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x400) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000001c0)={0x6, 0x1, 0xfffffffffffff001, 0x10001, 0x7}, 0xc) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x4, 0x100, 0x5}}, 0x28) write$P9_RREAD(r1, &(0x7f0000000080)={0xb6, 0x75, 0x1, {0xab, "00d1aa9099a66e90665537765e9892d1f15763b22b7a36d797260ba0ca97f5efb19ece01ec9b06461f98d91b4c80eb75a2d07be5e827e92eaa7c4859de04e862c069977358400304618082a9798d2781aa18ddd0c0293e1f186b5b62885116fe255cf3f2e21fdeced1531c2ccb1b8c5c544cba9b713fed940fc1f01b8ff628f30745a0926f70515f48c5db33a5df03b6428aa7fd65b154e4083fa262332c985aefbe231ab32d2d176174e9"}}, 0xb6) 19:40:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x3f00000000000000}}]}, 0x70}}, 0x0) [ 974.318620] audit: type=1326 audit(1545075645.135:1029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6191 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x3d, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x8000000}}]}, 0x70}}, 0x0) 19:40:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff00000000]}}}]}, 0x30}}, 0x0) [ 974.406447] IPVS: ftp: loaded support on port[0] = 21 19:40:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:45 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000]}}}]}, 0x30}}, 0x0) 19:40:45 executing program 0: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000080)=0xfffffffffffffea5) setuid(r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1ffffffffffffc84, &(0x7f00000003c0)=ANY=[@ANYRESHEX, @ANYRES16=0x0, @ANYRES64=r0, @ANYBLOB="07f3259f52f4d65e4db5d684aaf97142646390df86a3b9e495be12df5734eb598346db71aaface1ca5820da0dcd0dfd1906ea61feefe727946617c5e7bd6aaf775cd9898cfe7817becbef663ea7d34793a3fd3d94a09777c8850b2ae3007d00119e3bd3a2764224e49044e49173b112363f678a2a375d4bc9957cdb7324232039bebe8fb30b8b0e41bb3027d31f3f6735a9ed8a12543c32b9670dfe12e1a73b7b7b4d3163a4956bf46a558f565afb619984a20c42d1830e04ec8bc7d0e320b92cdd8934e80968073664c95a54d21a06e36f77e755594afe99ead8008939a1d4e386fdc8495b4932e28d0ede3f1b81f6899", @ANYBLOB="59d2dd8677a94f79d6283cb19782cb81d56a1262b846ead015493b1563c42953e0cbb84704f53833d20da2114202d14c916c459e8be70d3717747d6b6184312a1a9a4a47f4e16f56d792966169b5f7befe52a35f2f457a81f2deded8c69bc870490cbb77582de01f7b42d8914f53e5887805c127bd"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], r0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) r3 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x9e, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r4 = memfd_create(&(0x7f0000000280)='md5sumem1\x00', 0x1) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f0000000340)=0x40, 0x2) ioctl$SG_SET_TIMEOUT(r4, 0x2201, &(0x7f00000002c0)=0x80000001) ioctl$KVM_PPC_GET_PVINFO(r2, 0x4080aea1, &(0x7f0000000580)=""/242) [ 974.899400] IPVS: ftp: loaded support on port[0] = 21 [ 975.115101] audit: type=1326 audit(1545075645.935:1030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6191 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:46 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xa4030000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6c, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1001]}}}]}, 0x30}}, 0x0) 19:40:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0xffffff7f}}]}, 0x70}}, 0x0) 19:40:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702ea70fa400000bfa300000000000007030000effdffff7a0af0fff8ffffff79a4f0ff00000000ff2d640500000000006504040001000000040400fa95640d900001007d60b7030000000000006a0a00fe00000000850000000d000047d054a16667bbe08bcb3300a9bf22c7a0ac0b08233e477ed62b075a32c7b12ca064a1554af52b8517"], 0x0}, 0x48) dup2(r0, r0) open(&(0x7f0000000080)='./file0\x00', 0x800, 0x81) memfd_create(&(0x7f0000000100)='\x00', 0x4) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f0000000000)=""/119, &(0x7f0000000080)=0x77) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:46 executing program 0: prctl$PR_GET_FPEXC(0xb, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x1, 0x0, [0x0]}) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) [ 975.313438] audit: type=1326 audit(1545075646.135:1031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6236 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}}}]}, 0x30}}, 0x0) 19:40:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1000000}}]}, 0x70}}, 0x0) [ 975.416528] IPVS: ftp: loaded support on port[0] = 21 19:40:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7ffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x88) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000100)=0x3f, 0x4) 19:40:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6b0, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]}}}]}, 0x30}}, 0x0) [ 975.923009] IPVS: ftp: loaded support on port[0] = 21 [ 976.112415] audit: type=1326 audit(1545075646.935:1032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6236 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:49 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x2010000, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x3f00}}]}, 0x70}}, 0x0) 19:40:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000873611801007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) munlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x100) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000100)) write$UHID_INPUT2(r1, &(0x7f0000000100)={0xc, 0xf9, "4f8bc51126dd278b188cb669622d85e80435663b4ddabf3d89a4eab47595dd657512cbf38809bf9079b664d7d7045ffb4c49c4e004a5b31c76e0739636e2e2438ae22c8cfe876107a73a0f201b21203b4c5de9e19bfca46bdbb0be7a273023295ddf3bcf8cd2691d2fc2f00216696888175549d94bafbe55dbc9472592ecf946a36c969abb0e66a8a846a647eae6d8c01fdc3029aec7c59640b5a382b32843751aaeecdea0bf060f1720be33e35d778e13861e732c2a0c2fe7bb1ff15e0bf83d92f4f30933a9f43e1ce61d6670fe65638499bbfdc73fc62cc4d871d0763df408abc8c6263867aad9ded0b6eda93a144f19aaa892c1e6eb9b2f"}, 0xff) 19:40:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}}}]}, 0x30}}, 0x0) 19:40:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x34, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x408040, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000240)={{0x9, 0x2}, 'port1\x00', 0x18, 0x10000, 0x80000000, 0x9, 0x0, 0x2, 0x200, 0x0, 0x5, 0x1}) ioctl$KVM_NMI(r0, 0xae9a) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000100)={0x3, 0x8}) r1 = socket$inet6(0xa, 0x803, 0x5) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000040)={0x4, "0f213159d8494fd36556ec76ee76ab750b7e872b94e76ed18b652c73db0bad74", 0x3e344c02fa4d8d3a, 0x8, 0x5, 0x400, 0x400, 0x2}) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}}]}, 0x30}}, 0x0) [ 978.337322] audit: type=1326 audit(1545075649.155:1033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6296 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x94, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 978.441274] IPVS: ftp: loaded support on port[0] = 21 19:40:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) getgid() 19:40:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x8}}]}, 0x70}}, 0x0) 19:40:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}}}]}, 0x30}}, 0x0) 19:40:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x3c, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 978.961738] IPVS: ftp: loaded support on port[0] = 21 [ 979.124526] audit: type=1326 audit(1545075649.945:1034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6296 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:50 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xb401, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x180000000000000a, 0x2a7, 0x0, &(0x7f0000000100)="b9070300000008bb24879e108847", 0x0}, 0x28) 19:40:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x200000000000000}}]}, 0x70}}, 0x0) 19:40:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}}]}, 0x30}}, 0x0) 19:40:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x44, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x0, 0x80000001) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 979.435083] audit: type=1326 audit(1545075650.255:1035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6343 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}}]}, 0x30}}, 0x0) 19:40:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x24, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000100)={0x7fff, 0x9, 0x3, {0x8, @pix_mp={0x4, 0x81, 0x0, 0x0, 0x6, [{0x8, 0x1}, {0x5, 0x1}, {0x1000000000000, 0x4}, {0x8, 0xffffffffffffffff}, {0x1, 0xce3e}, {0x5e4, 0x7f}, {0xfffffffffffffffd, 0x7}, {0x4}], 0x401, 0x69815b4c, 0x3, 0x1, 0x4}}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) 19:40:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x1000000000000000}}]}, 0x70}}, 0x0) [ 979.578089] IPVS: ftp: loaded support on port[0] = 21 19:40:50 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80]}}}]}, 0x30}}, 0x0) 19:40:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x17f, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 980.001943] IPVS: ftp: loaded support on port[0] = 21 [ 980.205555] audit: type=1326 audit(1545075651.025:1036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6343 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x10e, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:51 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000280)=0x10) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000400)={0x0, 0x0, 0x2080}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000003780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000037c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000003800)={@remote, @loopback, @mcast2, 0x0, 0x3, 0x1, 0x500, 0xffffffffffffff7f, 0x1c00131, r3}) getsockopt$inet_mreqsrc(r2, 0x0, 0x2f, &(0x7f0000000140)={@multicast1, @remote, @multicast1}, &(0x7f0000000180)=0xc) 19:40:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x4000000}}]}, 0x70}}, 0x0) 19:40:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}}]}, 0x30}}, 0x0) 19:40:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x21, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @aes256}) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000180)=ANY=[@ANYBLOB="b702000008000000bfa3000000000706000000feffff7a0af0fff8ffffff79a4f0ff00000000b706004b33a258a1d2fca50065040400010200000404000001007d60b7036140b220f40000000000006a0a00fe0000008a2584089706cb3c9700850000000d000000b7000000000000009500000000"], 0x0}, 0x48) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000014c0)=@req3={0x7fff, 0x3, 0x1352, 0xffffffff, 0x3, 0xffffffffffffffff, 0x2}, 0x1c) r1 = dup2(r0, r0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000001480)) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0xc040, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000002c0)=""/86) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000040)=0x5424, &(0x7f0000000100)=0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e108847", 0x0, 0x69}, 0x28) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f00000002c0)={0x0, 0x100000001, 0x4, {0x1, @vbi={0x0, 0x0, 0x0, 0x0, [0x0, 0x96000]}}}) ioctl$VIDIOC_STREAMON(r3, 0x40045612, &(0x7f0000000080)=0x1) ioctl$VIDIOC_STREAMON(r3, 0x40045612, &(0x7f0000000000)=0x1) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000480)=""/4096) setsockopt(r2, 0x0, 0x2, &(0x7f0000000340)="4063371b4ed0274e84c16c48bafd024650e3515baba3fa997b00bfb83201fa8051c58bb99a40803cd71c9a927695639c1e3dc3f769d28fe191e3bf71ade391db2fc19b354652a24551f1bec0cbc5d29a4b4d1d20917c2d2303e95033d87ac01c33ac36540b28901c31fcc8da68cb24092a78677b8a99e7bcb3d8bc0bbf7c0aed69a6f078a3d0e1da8db4109cd65d4bfcc4ae1c73734470c2304807092c10070dac6fc3056f09d04e037ee24c04fe9eadf3e1912b4020a295233089b529a0cf", 0xbf) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000400)={{0x0, 0x4, 0x1, 0x7fff}, 'syz0\x00', 0x57}) [ 980.373989] audit: type=1326 audit(1545075651.195:1037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6388 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x25, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x4}}]}, 0x70}}, 0x0) 19:40:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcffffff00000000]}}}]}, 0x30}}, 0x0) [ 980.587070] IPVS: ftp: loaded support on port[0] = 21 19:40:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x74, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}}]}, 0x30}}, 0x0) [ 980.958909] IPVS: ftp: loaded support on port[0] = 21 [ 981.174667] audit: type=1326 audit(1545075651.995:1038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6388 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:52 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x3c01, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000440)=0x54) 19:40:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2, 0x34000}}]}, 0x70}}, 0x0) 19:40:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x50, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") 19:40:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001480)=@newspdinfo={0x30, 0x24, 0x9, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcffffff]}}}]}, 0x30}}, 0x0) 19:40:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000040)="e4b7a7b70ce399faff510000000000000000000000000000") [ 981.417637] audit: type=1326 audit(1545075652.235:1039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6431 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 19:40:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x62e, 0x0, 0x0, 0xfffffffffffffffa}]}) r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") [ 981.567887] IPVS: ftp: loaded support on port[0] = 21 [ 981.893804] IPVS: ftp: loaded support on port[0] = 21 [ 982.196522] audit: type=1326 audit(1545075653.015:1040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6431 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0xffff0000 [ 1137.940118] INFO: task syz-executor0:6399 blocked for more than 140 seconds. [ 1137.947470] Not tainted 4.20.0-rc7+ #155 [ 1137.952136] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1137.960195] syz-executor0 D22072 6399 682 0x00000004 [ 1137.965836] Call Trace: [ 1137.968422] __schedule+0x8cf/0x21d0 [ 1137.972215] ? __sched_text_start+0x8/0x8 [ 1137.976396] ? check_preemption_disabled+0x48/0x280 [ 1137.981598] ? debug_smp_processor_id+0x1c/0x20 [ 1137.986286] ? perf_trace_lock+0x14d/0x7a0 [ 1137.990597] ? lock_is_held_type+0x210/0x210 [ 1137.995032] ? zap_class+0x640/0x640 [ 1137.998737] ? zap_class+0x640/0x640 [ 1138.002541] schedule+0xfe/0x460 [ 1138.005915] ? __schedule+0x21d0/0x21d0 [ 1138.009950] ? find_held_lock+0x36/0x1c0 [ 1138.014031] ? mark_held_locks+0xc7/0x130 [ 1138.018173] schedule_timeout+0x1cc/0x260 [ 1138.022406] ? usleep_range+0x1a0/0x1a0 [ 1138.026393] ? wait_for_completion+0x41f/0x8a0 [ 1138.031767] ? trace_hardirqs_off_caller+0x310/0x310 [ 1138.036879] wait_for_completion+0x427/0x8a0 [ 1138.041352] ? wait_for_completion_interruptible+0x840/0x840 [ 1138.047175] ? wake_up_q+0x100/0x100 [ 1138.050951] ? lock_release+0xa00/0xa00 [ 1138.054941] ? __init_waitqueue_head+0x9e/0x150 [ 1138.059601] ? init_wait_entry+0x1c0/0x1c0 [ 1138.063895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1138.069451] flush_workqueue+0x742/0x1e10 [ 1138.073708] ? mark_held_locks+0x130/0x130 [ 1138.077980] ? cancel_delayed_work+0x3e0/0x3e0 [ 1138.082624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1138.088255] ? check_preemption_disabled+0x48/0x280 [ 1138.093390] ? debug_smp_processor_id+0x1c/0x20 [ 1138.098070] ? perf_trace_lock+0x14d/0x7a0 [ 1138.102360] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1138.107307] ? __lock_acquire+0x62f/0x4c20 [ 1138.111601] ? unwind_dump+0x190/0x190 [ 1138.115499] ? zap_class+0x640/0x640 [ 1138.119209] ? mark_held_locks+0x130/0x130 [ 1138.123508] ? __kernel_text_address+0xd/0x40 [ 1138.128029] ? lock_acquire+0x1ed/0x520 [ 1138.132068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1138.137616] ? check_preemption_disabled+0x48/0x280 [ 1138.142693] ? debug_smp_processor_id+0x1c/0x20 [ 1138.147371] ? perf_trace_lock+0x14d/0x7a0 [ 1138.151658] ? lock_downgrade+0x900/0x900 [ 1138.155907] ? kfree+0xcf/0x230 [ 1138.159200] ? lock_is_held_type+0x210/0x210 [ 1138.164428] ? __mutex_lock+0x85e/0x16f0 [ 1138.168492] ? zap_class+0x640/0x640 [ 1138.172387] ? vidioc_querycap+0xd0/0xd0 [ 1138.176585] vim2m_stop_streaming+0x7c/0x2c0 [ 1138.181082] ? vim2m_stop_streaming+0x7c/0x2c0 [ 1138.185682] ? vim2m_buf_queue+0xa0/0xa0 [ 1138.189735] ? vidioc_querycap+0xd0/0xd0 [ 1138.194055] __vb2_queue_cancel+0x14f/0xd50 [ 1138.198416] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1138.203106] ? trace_hardirqs_on+0xbd/0x310 [ 1138.207436] ? kasan_check_read+0x11/0x20 [ 1138.211726] ? v4l2_m2m_cancel_job+0x2f3/0x650 [ 1138.216325] ? vb2_buffer_done+0xbb0/0xbb0 [ 1138.220662] ? kasan_check_read+0x11/0x20 [ 1138.224825] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1138.229993] ? v4l2_m2m_cancel_job+0x2f8/0x650 [ 1138.234596] ? v4l2_m2m_job_finish+0x4c0/0x4c0 [ 1138.239174] ? kasan_check_read+0x11/0x20 [ 1138.243416] ? mutex_destroy+0x103/0x200 [ 1138.247485] ? percpu_down_write+0x540/0x540 [ 1138.252004] ? vidioc_querycap+0xd0/0xd0 [ 1138.256084] vb2_core_queue_release+0x26/0x80 [ 1138.260700] vb2_queue_release+0x15/0x20 [ 1138.264770] v4l2_m2m_ctx_release+0x1e/0x35 [ 1138.269084] vim2m_release+0xe6/0x150 [ 1138.273031] v4l2_release+0x224/0x3a0 [ 1138.276853] ? dev_debug_store+0x140/0x140 [ 1138.281149] __fput+0x385/0xa30 [ 1138.284524] ? get_max_files+0x20/0x20 [ 1138.288420] ? trace_hardirqs_on+0xbd/0x310 [ 1138.293602] ? kasan_check_read+0x11/0x20 [ 1138.297751] ? task_work_run+0x1af/0x2a0 [ 1138.301875] ? trace_hardirqs_off_caller+0x310/0x310 [ 1138.306991] ? filp_close+0x1cd/0x250 [ 1138.310863] ____fput+0x15/0x20 [ 1138.314156] task_work_run+0x1e8/0x2a0 [ 1138.318033] ? task_work_cancel+0x240/0x240 [ 1138.322428] ? copy_fd_bitmaps+0x210/0x210 [ 1138.326679] ? do_syscall_64+0x9a/0x820 [ 1138.330723] exit_to_usermode_loop+0x318/0x380 [ 1138.335322] ? __bpf_trace_sys_exit+0x30/0x30 [ 1138.340172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1138.345806] do_syscall_64+0x6be/0x820 [ 1138.349696] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1138.355220] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1138.360208] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1138.365048] ? trace_hardirqs_on_caller+0x310/0x310 [ 1138.370104] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1138.375116] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1138.380174] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1138.385249] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1138.390476] RIP: 0033:0x411121 [ 1138.393662] Code: ff ff 48 3b 61 10 0f 86 96 00 00 00 48 83 ec 28 48 89 6c 24 20 48 8d 6c 24 20 48 8b 4c 24 38 48 85 c9 7c 60 48 8b 54 24 30 48 <8b> 1a 48 83 fb 21 73 3b 48 8d 05 70 56 78 00 48 8b 04 d8 48 39 c1 [ 1138.412640] RSP: 002b:00007ffece65da00 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1138.420993] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000411121 [ 1138.428260] RDX: 0000000000000001 RSI: 0000000000731590 RDI: 0000000000000003 [ 1138.435608] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1138.443038] R10: 00007ffece65d930 R11: 0000000000000293 R12: 0000000000000000 [ 1138.450432] R13: 0000000000000001 R14: 000000000000014a R15: 0000000000000000 [ 1138.457729] [ 1138.457729] Showing all locks held in the system: [ 1138.464382] 1 lock held by khungtaskd/1021: [ 1138.468710] #0: 0000000003e2c717 (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 1138.478252] 1 lock held by rsyslogd/6126: [ 1138.482433] #0: 00000000a491820e (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 1138.490525] 2 locks held by getty/6248: [ 1138.494517] #0: 0000000019366d56 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1138.502921] #1: 0000000050614199 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1138.511923] 2 locks held by getty/6249: [ 1138.515901] #0: 00000000bbdd9b2f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1138.524207] #1: 000000009ae97880 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1138.533121] 2 locks held by getty/6250: [ 1138.537077] #0: 0000000013ec03d0 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1138.545372] #1: 000000005bf848d5 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1138.555229] 2 locks held by getty/6251: [ 1138.559208] #0: 000000003b06795e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1138.567636] #1: 0000000001c03b87 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1138.576566] 2 locks held by getty/6252: [ 1138.581419] #0: 0000000013964823 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1138.589660] #1: 000000008747f932 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1138.598579] 2 locks held by getty/6253: [ 1138.602601] #0: 00000000408d6a3b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1138.610891] #1: 000000002591ce9b (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1138.619754] 2 locks held by getty/6254: [ 1138.623856] #0: 00000000223029ff (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1138.632162] #1: 000000006c0df167 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1138.641077] 2 locks held by kworker/0:3/6533: [ 1138.645572] #0: 0000000045b713d7 ((wq_completion)"events"){+.+.}, at: process_one_work+0xb43/0x1c40 [ 1138.654900] #1: 00000000bb3b9104 ((work_completion)(&smc->tcp_listen_work)){+.+.}, at: process_one_work+0xb9a/0x1c40 [ 1138.665833] 2 locks held by kworker/1:5/15400: [ 1138.670465] #0: 0000000045b713d7 ((wq_completion)"events"){+.+.}, at: process_one_work+0xb43/0x1c40 [ 1138.679769] #1: 00000000fe6bc61e ((work_completion)(&smc->tcp_listen_work)){+.+.}, at: process_one_work+0xb9a/0x1c40 [ 1138.691362] 2 locks held by syz-executor0/6399: [ 1138.696025] #0: 00000000955998f0 (&mdev->req_queue_mutex){+.+.}, at: v4l2_release+0x1d7/0x3a0 [ 1138.704835] #1: 00000000bd16da80 (&dev->dev_mutex){+.+.}, at: vim2m_release+0xbc/0x150 [ 1138.713046] [ 1138.714660] ============================================= [ 1138.714660] [ 1138.721736] NMI backtrace for cpu 0 [ 1138.725372] CPU: 0 PID: 1021 Comm: khungtaskd Not tainted 4.20.0-rc7+ #155 [ 1138.732473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1138.741818] Call Trace: [ 1138.744410] dump_stack+0x244/0x39d [ 1138.748029] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1138.753217] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1138.758775] nmi_cpu_backtrace.cold.2+0x5c/0xa1 [ 1138.763534] ? lapic_can_unplug_cpu.cold.27+0x3f/0x3f [ 1138.768718] nmi_trigger_cpumask_backtrace+0x1e8/0x22a [ 1138.773985] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1138.779162] watchdog+0xb51/0x1060 [ 1138.782696] ? hungtask_pm_notify+0xb0/0xb0 [ 1138.787008] ? __kthread_parkme+0xce/0x1a0 [ 1138.791231] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1138.796318] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1138.801421] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1138.805995] ? trace_hardirqs_on+0xbd/0x310 [ 1138.810302] ? kasan_check_read+0x11/0x20 [ 1138.814569] ? __kthread_parkme+0xce/0x1a0 [ 1138.818805] ? trace_hardirqs_off_caller+0x310/0x310 [ 1138.823900] ? trace_hardirqs_off_caller+0x310/0x310 [ 1138.828999] ? lockdep_init_map+0x9/0x10 [ 1138.833051] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1138.838142] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1138.843666] ? __kthread_parkme+0xfb/0x1a0 [ 1138.847901] ? hungtask_pm_notify+0xb0/0xb0 [ 1138.852224] kthread+0x35a/0x440 [ 1138.855586] ? kthread_stop+0x900/0x900 [ 1138.859569] ret_from_fork+0x3a/0x50 [ 1138.863501] Sending NMI from CPU 0 to CPUs 1: [ 1138.868090] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0x6/0x10 [ 1138.870116] Kernel panic - not syncing: hung_task: blocked tasks [ 1138.881839] CPU: 0 PID: 1021 Comm: khungtaskd Not tainted 4.20.0-rc7+ #155 [ 1138.888844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1138.898185] Call Trace: [ 1138.900771] dump_stack+0x244/0x39d [ 1138.904397] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1138.909577] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1138.914644] panic+0x2ad/0x55c [ 1138.917826] ? add_taint.cold.5+0x16/0x16 [ 1138.921964] ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a [ 1138.927402] ? nmi_trigger_cpumask_backtrace+0x1f9/0x22a [ 1138.932839] ? nmi_trigger_cpumask_backtrace+0x1d1/0x22a [ 1138.938276] ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a [ 1138.943719] watchdog+0xb62/0x1060 [ 1138.947255] ? hungtask_pm_notify+0xb0/0xb0 [ 1138.951667] ? __kthread_parkme+0xce/0x1a0 [ 1138.955899] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1138.960991] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1138.966083] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1138.970655] ? trace_hardirqs_on+0xbd/0x310 [ 1138.974969] ? kasan_check_read+0x11/0x20 [ 1138.979102] ? __kthread_parkme+0xce/0x1a0 [ 1138.983401] ? trace_hardirqs_off_caller+0x310/0x310 [ 1138.988499] ? trace_hardirqs_off_caller+0x310/0x310 [ 1138.993591] ? lockdep_init_map+0x9/0x10 [ 1138.997646] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1139.002738] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1139.008263] ? __kthread_parkme+0xfb/0x1a0 [ 1139.012487] ? hungtask_pm_notify+0xb0/0xb0 [ 1139.016809] kthread+0x35a/0x440 [ 1139.020169] ? kthread_stop+0x900/0x900 [ 1139.024131] ret_from_fork+0x3a/0x50 [ 1139.028933] Kernel Offset: disabled [ 1139.032585] Rebooting in 86400 seconds..